LATEST NEWS

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic

Some cyber attacks are so disastrous that there’s no coming back from them. Email provider VFEmail worried that was the

A majority of organizations confessed that they are not certain whether the security strategies they have in place will be

A technology partner of the three big credit reporting agencies has been breached in what appears to be a classic

Researchers devised a new technique to hide malware in the security Intel SGX enclaves, making it impossible to detect by

The dark web seller identified as gnosticplayers on Dream Market has removed all listings that were previously up for sale,

Expert discovered a privilege escalation vulnerability in default installations of Ubuntu Linux that resides in the snapd API. Security researcher

The vast majority of UK businesses have suffered data breaches over the past 12 months, many of them multiple times,

A major cyber-attack has hit email provider VFEmail in what the company is calling a “catastrophic attack,” which has destroyed

620 million accounts stolen from 16 hacked websites (Dubsmash, Armor Games, 500px, Whitepages, ShareThis) available for sale on the dark

Enterprises have been urged to patch a serious flaw in runc, the default runtime for Docker and Kubernetes, and ensure

“The security discussion starts with risk, but what has become very apparent at the board level is that most don’t

The 0patch experts released a micropatch to address an in Adobe Reader zero-day that allows maliciously PDF docs to call

Just under half of a surveyed set of British small to medium-sized businesses (SMBs) believe that a cyber-attack would put

Cybaze-Yoroi ZLAB revealed interesting a hidden connection between the AZORult toolkit and specific Gootkit payload. Introduction In the last days,

Across healthcare organizations in the US, malicious actors are successfully leveraging phishing attacks to initially gain access to networks, according

Beware, Xiaomi M365 scooters riders, as security researchers say the scooters can be remotely hacked from up to 100 meters

Predicting threats that are yet to come is always tricky, but a new report published by Booz Allen, 2019 Cyberthreat

 
 

IT Security

Data privacy has made big headlines in the last 12 months. Wherever we look there is an article about a

Like most humans, I’m more vocal about the things I don’t like and less likely to crow about the things

Cloud-based endpoint security company CrowdStrike has launched a new platform that allows other security vendors to use its own software

TELECOM SECURITY

IoT Devices at a Risk

Security researchers at Senrio, an IoT focused security firm, have a discovered a stack buffer overflow vulnerability (CVE-2017-9765) in an

News of the second Kmart credit-card breach in three years at the retailer and the number of breaches at financial

VoIP, short for Voice over Internet Protocol, allows businesses to make free, or very low-cost, telephone calls over the Internet.

Industrial & OT Security

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last

Microsoft last week unveiled Trusted Cyber Physical Systems (TCPS), a new solution designed to help protect critical infrastructure against modern

Kaspersky-OS

On a day by day basis do IOT (Internet of Things) and SCADA become more integrated in our lives. However,

CLOUD SECURITY

Network and endpoint security company, Sophos, announced today that it has acquired Avid Secure, a cloud infrastructure security company that

Hewlett Packard Enterprise is looking to realign channel partners in Europe around the cloud and shift their mindset from selling

New AES-256 encryption for data at rest, more efficient storage APIs and a revamped Storage Explorer app are among Azure

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...