LATEST NEWS

Nearly half (48%) of organizations regularly push vulnerable code into production in their application security programs due to time pressures,

Two California cybersecurity companies have joined forces to help protect healthcare networks from cyber-threats. CynergisTek and Awake Security announced yesterday

An investigation is under way into a data breach that impacted an online examination tool used by educational establishments around

There has been no shortage of Bluetooth related attacks disclosed in recent years, including BlueBorne and BadBlueTooth among numerous others.

In a session at the Black Hat USA 2020 virtual conference on August 5, Kevin Perlow, technical intelligence team lead

Recently, the U.S. government exposed Chinese surveillance malware “TAIDOOR” that are secretly used by the Chinese government for a decade.

A cyber-attack on Redcar & Cleveland Borough Council earlier this year has reportedly cost around GBP10m in recovery costs. The

Cybercrime is growing at an “alarming pace” as a result of the ongoing COVID-19 crisis and is expected to accelerate

Recently one of the most dangerous ransomware, WastedLocker, owes its success to a unique bypass mechanism for security solutions and

More than 86% of web applications have critical vulnerabilities that can lead to resource compromise and theft of confidential information.

North Dakota has suffered fewer data breaches than any other American state over the past 15 years. Analysis of data

The number of commodity malware campaigns exploiting machine identities doubled between 2018 and 2019, according to new research. The rapid

Just under half of businesses have experienced at least one “business impacting cyber-attack” related to COVID-19 as of April 2020.

ZDNet reported in exclusive that a list of passwords for 900+ enterprise VPN servers has been shared on a Russian-speaking

Tanium has partnered with Google Cloud to integrate threat response and Chronicle’s security analytics platform. The partnership will unite the

Digital asset infrastructure company Copper Technologies has announced the appointment Jake Rogers as its new chief information security officer. Rogers

Cloud breaches are likely to increase in “velocity and scale” due to a prevalence of poor cybersecurity practices in cloud

Over four in 10 (42%) organizations take disciplinary action against employees who make cybersecurity errors, which puts them at greater

 
 

IT Security

In many cases, the simplest solutions are the best ones as well. However, when it comes to protecting your website

A Vulnerability Scanning Tools is one of the essential tools in IT departments Since vulnerabilities pop up every day and

Spyse is a cybersecurity search engine that has caught the attention of many pentesters due to its unique data-gathering design.

TELECOM SECURITY

Our world is increasingly becoming digital as we are moving towards a society that is interconnected through a web of

SOC Training is one of the most important concern in order to build a Quality Security Operation Center Team to

What is an Indicator of Attack (IOA) IoA’s is some events that could reveal an active attack before indicators of

Industrial & OT Security

In the IoT Ecosystem, Not too long ago in history, the idea that people and objects could be inter-connected would

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last

CLOUD SECURITY

CASB definition Think of cloud access security brokers (CASBs) as central data authentication and encryption hubs for everything your enterprise

Cloud migration is the process of moving applications into the public and private cloud infrastructure to achieve cloud’s agility, resiliency

Cloud Security Solutions is one of the challenging tasks while performing the cloud migration for any organization and they need

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...