LATEST NEWS

A major data breach at mobile payment app Bharat Interface for Money (BHIM) has exposed the personal and financial data

An Australian football fan site has been found leaking 70 million records, including users’ personal details and racist private messages,

Maintainers at the Joomla open-source content management system (CMS) announced a security breach that took place last week. Last week

Amtrak has revealed that some customers may have had their personal information and log-ins stolen after it detected unauthorized access

Police and city websites in Minneapolis have come under cyber-attack as both lawful protests and illegal rioting continue across America.

Indian Security researcher found a critical Zero-day vulnerability in “Sign in with Apple” let hackers take over the third-party application

HackerOne declared that hackers have earned $100 million in bug bounties on the HackerOne platform. Hackers have become an essential

EU Agency for Cybersecurity ENISA has published a new report of the proactive detection of incidents, including measures and information

Recently, the attackers hacked a number of Cisco Systems servers using the Cisco Virtual Internet Routing Lab Personal Edition (VIRL-PE)

NSA warns that Russian hackers exploiting the Exim vulnerability (CVE-2019-10149) since at least last August. The APT hacker group linked

Security researchers uncovered a new COVID-19-themed campaign targeting users of the National Institute for Social Security (INPS). Security experts from

Michigan State University is the last victim of the NetWalker ransomware, attackers threaten to leak stolen files if it will

Since the beginning of the COVID-19 pandemic, organizations have experienced a dramatic increase in the number of cybersecurity attacks directed

The University of Texas at San Antonio (UTSA) is to create and lead a new federal digital research institute that

The UK government has today launched a program to incentivize the creation of design schemes that test the security of

Most organizations are not sufficiently prepared to securely support remote working even though 84% intend to continue this practice beyond

Seniors in Alabama are being given the chance to learn about cybersecurity free of charge thanks to the University of

GitHub has issued a security alert warning of a malware campaign that is spreading on its platform via boobytrapped NetBeans

 
 

IT Security

A web application firewall is a firewall that monitors, filters and blocks statistics packets as they journey to and from

A vulnerability is some aspect of a system functionality, architecture, or configuration that enables cybercriminals to execute attacks, exploit services,

A vital part of any comprehensive security program includes endpoint protection. Also known as endpoint security. But both terms refer

TELECOM SECURITY

SOC Training is one of the most important concern in order to build a Quality Security Operation Center Team to

What is an Indicator of Attack (IOA) IoA’s is some events that could reveal an active attack before indicators of

In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM,etc.) and the prioritize in building the SOC provides security

Industrial & OT Security

In the IoT Ecosystem, Not too long ago in history, the idea that people and objects could be inter-connected would

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last

CLOUD SECURITY

CASB definition Think of cloud access security brokers (CASBs) as central data authentication and encryption hubs for everything your enterprise

Cloud migration is the process of moving applications into the public and private cloud infrastructure to achieve cloud’s agility, resiliency

Cloud Security Solutions is one of the challenging tasks while performing the cloud migration for any organization and they need

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...