LATEST NEWS

Dell is said to be finalizing a $2bn deal to sell its RSA cybersecurity company to a private equity firm,

Security researchers have joined the dots on a long-running Iranian cyber-espionage campaign that targeted unpatched bugs in VPN and RDP

Two-thirds (66%) of global CISOs say they are struggling to recruit the right talent and a similar number believe shortages

Security researchers are warning of a new plugin vulnerability which is exposing over 200,000 WordPress sites to the risk of

A security expert found a flaw in SharePoint that could be exploited to remotely execute arbitrary code by sending a

Researchers discovered a widespread Iranian malware campaign called Fox Kitten that targeting the several organization networks by exploiting the Vulnerabilities

The popular hacker group OurMine has hacked the official Twitter account of the FC Barcelona, along with the accounts of

New figures tabled in Canada’s House of Commons have revealed that at least 144,000 Canadians have had their personal information

A popular photo app has leaked the personal data and images of thousands of customers via an unsecured Amazon Web

IBM has confirmed that it plans to not participate in next week’s RSA Conference in San Francisco. Citing the “health

The UK’s anti-doping agency has been on the receiving end of over 11,000 malicious emails in the final three months

A local authority in the north-east of England appears to have suffered a major ransomware attack, leaving online public services

Iran-linked attackers targeted Pulse Secure, Fortinet, Palo Alto Networks, and Citrix VPNs to hack into large companies as part of

A group of security researchers uncovered a 12 Bluetooth based vulnerabilities dubbed “SweynTooth” in BLE software development kits of seven

Researchers uncovered a stealthy Android malware called XHelper that has unseen reinstalling capability after the malware removed from the infected

IOTA Foundation behind the IOTA cryptocurrency was forced to shut down its entire network following a cyber attack that resulted

Photos and personal information belonging to patients of the NextMotion plastic surgery tech firm have been exposed online through an

A Chattanooga, Tennessee, information technology infrastructure and cybersecurity consulting firm has unveiled an $8m expansion plan that will see its

 
 

IT Security

Proactive Controls for Software developers describing the more critical areas that software developers must focus to develop a secure application.

Nowadays, employees, customers, and stakeholders at all levels are adopting BYOD onboarding practices. Fortunately, it’s entirely possible for companies to

In general, the most secure software is open source. Even old, underfunded open-source security projects can still withstand the onslaught

TELECOM SECURITY

In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM,etc.) and the prioritize in building the SOC provides security

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any

Industrial & OT Security

In the IoT Ecosystem, Not too long ago in history, the idea that people and objects could be inter-connected would

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last

CLOUD SECURITY

CASB definition Think of cloud access security brokers (CASBs) as central data authentication and encryption hubs for everything your enterprise

Cloud migration is the process of moving applications into the public and private cloud infrastructure to achieve cloud’s agility, resiliency

Cloud Security Solutions is one of the challenging tasks while performing the cloud migration for any organization and they need

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...