LATEST NEWS

A lack of CEO awareness and engagement with cybersecurity could be placing their organizations at unnecessary risk of attack, according

The UK’s National Cyber Security Centre (NCSC) has dismantled tens of thousands of phishing campaigns and fraudulent websites over the

Kali Linux announced a free Kali NetHunter App Store available for non-NetHunter devices so that anyone can avail the packages.

A recent Microsoft Support knowledgebase article and servicing stack update for Windows operating systems offers a fix for a race

The Federal Bureau of Investigation (FBI) released master decryption keys for all the version ( 4, 5, 5.0.4, 5.1, and

American telecommunication company Sprint recently learned that hackers breached the customers account through Samsung website. According to the letter shared

Microsoft released a new security update for the vulnerability that affected Windows Defender Application Control (WDAC) that allows a local

Computer virus definition A computer virus is a form of malicious software that piggybacks onto legitimate application code in order

Security experts at Trend Micro have discovered that iOS URL scheme could allow an attacker to hijack users’ accounts via

A security researcher reported a critical vulnerability that allows malicious hackers to hack Instagram account and take complete control of

Cybersecurity incidents have cost UK mid-market firms a combined GBP30bn over the past year as automated attacks become the norm,

Some of the crooks behind the Dridex Trojan have split from the gang and released a forked version of the

The US Coast Guard recommended that ships update their cybersecurity strategies after a malware attack “significantly” degraded the computer systems

A critical security flaw dubbed “Media File Jacking” affected WhatsApp and Telegram for Android let hackers manipulate both apps media

A critical remote code execution vulnerability in WordPress plugin Ad Inserter, let hackers execute arbitrary PHP code in the vulnerable

US telecommunications company Sprint revealed that hackers compromised an unknown number of customer accounts via the Samsung.com “add a line” website. The

Experts at Vertical Structure and WhiteHat Security discovered a serious flaw that exposed millions of files stored on thousands of

The UK’s National Cyber Security Centre (NCSC) has issued a warning about DNS hijacking threats, as reports emerge of widespread

 
 

IT Security

With the increasing pace of digitalization, call centers are required to take numerous security considerations including Safe Cloud Migration into

Encryption is one of the best ways that organizations can protect their data from thieves. If critical information is stored

As companies get better at analyzing log data to spot potential security threats, legacy applications create blindspots that can be

TELECOM SECURITY

In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM,etc.) and the prioritize in building the SOC provides security

Web-based applications security relies on a number of factors among them is a Web Application Firewall (WAF). Cyberattacks are pouring

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information

Industrial & OT Security

Opsec definition Operations security, or opsec, is a process by which organizations assess and protect public data about themselves that

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

In many organizations, traditional IT and critical Operational Technology (OT) networks are being merged to take advantage of the speed

CLOUD SECURITY

Research shows that organizations are moving systems and data to the cloud in rising numbers. Security when working in the

Cloud migration is the process of moving applications into the public and private cloud infrastructure to achieve cloud’s agility, resiliency

Containerization continues to gain popularity with many large enterprises, where thousands of new containers can be deployed every day. Containerization

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...