LATEST NEWS

Cloud-based back-end services are letting mobile app developers down, according to research announced this week. Even when app developers are

Anti-malware company Trend Micro has patched a flaw in its password manager that could have enabled an attacker to run

A biometric building access system used by thousands of companies around the world has exposed 23 gigabytes of data, representing

SAP Patches Highest Number of Critical Flaws Since 2014 SAP released Security Patch Day updates for August 2019 that address

Researchers discovered a new Android malware “Cerberus” that is being rented (Malware-as-a-service) on underground forums for the last two year

The Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD) presentation from last week’s Black Hat conference by

Microsoft has patched 93 unique CVEs this month, and although there are no zero-days or publicly disclosed flaws, there’s plenty

Few complex professions change with the velocity of IT security. Practitioners are faced with an average of 5,000 to 7,000

British Airways has come under fire from the security community again, this time after a vulnerability in its e-ticketing system

The UK’s financial regulator has agreed to give the country’s payments and e-commerce providers more time to comply with new

Microsoft released new security updates under Patch Tuesday for August and fixed more than 90 vulnerabilities including 2 Bluekep based

Canada has launched a cybersecurity certification program to try and get small to midsize enterprises (SMEs) up to speed with

Just as exploits for Microsoft’s BlueKeep bug make it into the wild, the company has announced another set of vulnerabilities

An iPhone charging cable comes with preloaded payload, scripts, and commands that allows hackers to remotely open the terminal on

Security experts analyzed a new interesting Android banking Trojan, dubbed Cerberus, that is offered for rent by its author. A

Security researchers found a remotely exploitable critical vulnerability in a building management system used by businesses, hospitals, factories and other

Cybersecurity relies on specialists of every kind – CISOs, network systems administrators, cloud experts, human resources and more – to

Security researchers have warned organizations that unsolicited blank emails could be a warning sign they are being actively targeted by

 
 

IT Security

Businesses that are growing are always trying to expand in all departments and to do that they need a website

Commando VM 2.0, a new version of Windows-based security distribution released for penetration testing community and red teamers with updated

A Vulnerability Scanning Tools is one of the essential tools in IT departments Since vulnerabilities pop up every day and

TELECOM SECURITY

In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM,etc.) and the prioritize in building the SOC provides security

Web-based applications security relies on a number of factors among them is a Web Application Firewall (WAF). Cyberattacks are pouring

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information

Industrial & OT Security

In the IoT Ecosystem, Not too long ago in history, the idea that people and objects could be inter-connected would

Opsec definition Operations security, or opsec, is a process by which organizations assess and protect public data about themselves that

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

CLOUD SECURITY

CASB definition Think of cloud access security brokers (CASBs) as central data authentication and encryption hubs for everything your enterprise

Research shows that organizations are moving systems and data to the cloud in rising numbers. Security when working in the

Cloud migration is the process of moving applications into the public and private cloud infrastructure to achieve cloud’s agility, resiliency

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...