
Masterminds behind prolific CEO fraud ring arrested
It took two years and a collaborative effort of French, Belgian, Romanian and Israeli law enforcement agencies to take down an organised crime group that was behind at least …

How Mirai spawned the current IoT malware landscape
When, in late 2016, US-based DNS provider Dyn suffered a massive DDoS attack that it resulted in the temporary unavailability of many popular online services, the name of the …

Airports develop digital transformation roadmaps with biometrics and blockchain
Increased passenger traffic and global capacity constraints will drive airport IT spending to $4.63 billion by 2023, according to Frost & Sullivan. Airports are …

Apple security updates, iOS and macOS now support Messages in iCloud
It’s time to update your Apple devices and software again: the company has pushed out security updates for macOS, iOS, watchOS, tvOS, Safari, and iCloud and iTunes for …

Qualys at Infosecurity Europe 2018: Best practices presentations from industry leaders
There will be no lack of interesting content from Qualys at Infosecurity Europe this year. Depending on you interests, you might want to make time for some of these talks and …

Week in review: How GDPR affects WHOIS, and what CISOs can learn from Tyrion
Here’s an overview of some of last week’s most interesting news and articles: CIOs are forced to compromise between faster innovation and perfectly working …

Ticketfly got hacked, user data was leaked
Ticketfly, a ticket distribution service owned by event management and ticketing pioneer Eventbrite, appears to have been hacked. The service’s site is showing a simple …

Samsung doesn’t have to offer updates for phones older than two years
Dutch consumer protection organization Consumentenbond took Samsung Netherlands to court, arguing that the company should provide updates and upgrades for their telephones …

Are attackers harnessing your Redis server?
Earlier this year security researchers warned about vulnerable Apache Solr, Redis, and Windows servers hit with cryptominers. Imperva now says that that are still too many …

New infosec products of the week: June 1, 2018
JASK transforms how SOC operators visualize cyber attacks JASK is capturing industry demand with new features centered around enterprise-wide alert linkages and analyst …

The emergence and impact of the Data Protection Officer
According to Forrester, 80 percent of companies likely didn’t comply with the General Data Protection Regulation (GDPR) deadline, and of those, 50 percent intentionally …

California Senate votes to restore net neutrality rules
The California State Senate voted yesterday in favor of a bill aimed at restoring the net neutrality protections put in place by the Federal Communications Commission in 2015, …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware