LATEST NEWS

SoftNAS users should upgrade their virtual appliance immediately following the discovery of a security issue in the product’s session management.

Security experts at riskIQ revealed today that another two organizations were victims of Magecart crime gang, the bedding retailers MyPillow

Extensive Ransomware Attack forced to shut down operations at, Norsk Hydro, one of the world’s largest aluminum producers. The company

Goldmouse APT group (APT-C-27) now start exploiting the WinRAR vulnerability (CVE-2018-20250[6]) to hide the njRAT backdoor and targeting users reside

Recently Google announced two zero-days that impacted both the Chrome browser and Windows 7 operating system. Google released an update

Cyber-criminals are evolving their tactics with Business Email Compromise (BEC) attacks by transferring victims from email over to mobile communications

Security experts at Check Point uncovered a sophisticated malware campaign spreading the SimBad malicious code through the official Google Play

Windows Defender Security Intel has reported two major phishing attacks targeting American Express and NetFlix. The Office 365 research teams

Security professionals who attended RSA 2019 believe that the world is in the midst of cyber-war, according to a survey

As spear-phishing tactics continue to evolve, attackers are using these threats with greater frequency and severity, making spear-phishing attacks the

There was quite a bit of banter about boardroom cybersecurity actions at this year’s RSA Security Conference. No surprise here;

The giant of aluminum producers, Norway’s Norsk Hydro, announced on Tuesday that it had been hit by a cyber-attack of

Compliance can be costly and often feels more like red tape and a barrier to business than anything that provides

PaloAlto Networks researchers discovered a new variant of the infamous Mirai botnet is targeting IoT devices belonging to businesses. Researchers

Only around a quarter of the UK government’s gov.uk domains have been set up to support an industry best practice

A new strain of ransomware tracked as JNEC.a is spreading through an exploit that triggers the recently discovered vulnerability in

With the rapid turnover of technology, many consumers willingly trade in, sell or donate their old electronics, often times without

Attackers targeting legacy protocols with stolen credential dumps to increase the speed and efficiency of the brute force attacks. Based

 
 

IT Security

The following are the 11 best antivirus tools for Android, according to AV-TEST’s November 2018 evaluations of 18 Android security

Yuki Chan is an Automated Penetration Testing tool that will be auditing all standard security assessment for you.It is one

Choosing the Best Android Antivirus app is the most important concern to protect your Android device from sophisticated cyber threats.

TELECOM SECURITY

IoT Devices at a Risk

Security researchers at Senrio, an IoT focused security firm, have a discovered a stack buffer overflow vulnerability (CVE-2017-9765) in an

News of the second Kmart credit-card breach in three years at the retailer and the number of breaches at financial

VoIP, short for Voice over Internet Protocol, allows businesses to make free, or very low-cost, telephone calls over the Internet.

Industrial & OT Security

In many organizations, traditional IT and critical Operational Technology (OT) networks are being merged to take advantage of the speed

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last

Microsoft last week unveiled Trusted Cyber Physical Systems (TCPS), a new solution designed to help protect critical infrastructure against modern

CLOUD SECURITY

It’s no secret that most businesses and organizations work better when they embrace mobility. The old formula of having droves

One thing is certain. Capitalism ensures that change is the new constant. In the early 1990s, internet pioneers Prodigy Communications

Cloud Adoption on the Rise, IT Pros Unsure of Risk Even though misconfigurations in public clouds create risks to enterprise

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...