
Infosec expert viewpoint: DDoS attacks
DDoS attacks have become more extensive and are testing the limits of existing DDoS mitigation tools and practices, as well as affecting online businesses globally. …

Offshore law firm Appleby confirms data breach
Appleby, a major offshore law firm based in Bermuda, has confirmed it has suffered a data security incident in 2016 that resulted in some of their data being compromised. …

CEO email exposure underscores the importance of password management
Nearly one in three major CEOs has been pwned using their company email address, according to a new F-Secure study. In other words, a service they access using their company …

Lending industry faces higher fraud costs than e-commerce, retail and financial services
Lenders face higher costs of fraud than other industries, including retail, e-commerce and financial services. For every dollar of fraud, lending companies incur $2.82 in …

The race to quantum supremacy and its cybersecurity impact
Quantum computing uses the power of atoms to perform memory and processing tasks and remains a theoretical concept. However, it is widely believed that its creation is …

Coinhive breached due to old, reused password
Coinhive has suffered another setback: their DNS records have been surreptitiously changed by attackers, allowing them to steal cryptocurrency mined via the project’s …

NotPetya successor Bad Rabbit hits orgs in Russia, Ukraine
Bad Rabbit ransomware, apparently modeled on NotPetya, has hit a number of organizations across Russia, Ukraine, and Eastern Europe on Tuesday. Russian security outfit …

Is the Windows 10 controlled folder access anti-ransomware feature any good?
With last week’s release of Windows 10 Fall Creators Update, users get a new feature aimed at stopping ransomware from encrypting their most important files. It’s …

Data-driven analysis of vulnerabilities in real-world OT networks
Operational Technology (OT) networks are ripe targets for adversaries, whose motives range from criminal intent to operational disruption and even threats to human and …

Cloud security today: Complexity, compliance, and containerization
An new report by Threat Stack and ESG sheds light on the security and business challenges that accompany the growth of public cloud environments and containers. Overall, the …

Camera-based, single-step two-factor authentication resilient to pictionary, shoulder surfing attacks
A group of researchers from Florida International University and Bloomberg LP have created Pixie, a camera-based two-factor authentication system that could end up being a …

Immersive technologies are game changers for cybersecurity job growth
A new ESG study, which surveyed more than 500 people aged 16 to 24, revealed that 74% of respondents said the use of VR tools would increase their likelihood of pursuing …
Featured news
Resources
Don't miss
- Meta open-sources AI tool to automatically classify sensitive documents
- Why SAP security updates are a struggle for large enterprises
- Attackers fake IT support calls to steal Salesforce data
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)
- How to manage your cyber risk in a modern attack surface