LATEST NEWS

Expert discovered a new technique bypassing SMS-based two-factor authentication while circumventing Google’s recent SMS permissions restrictions The popular security expert

MongoDB has released a new version today featuring field-level encryption (FLE), a new mechanism that protects sensitive information stored in

Biometrics are seen as a positive step forward in authentication, but employees maintain privacy concerns. According to a survey of

Trust remains the most important factor in enabling security and identity management. Speaking at the Okta Forum in London, Okta

Researcher leaked online a dataset containing over 7,000,000 transactions scraped from the Venmo public API Venmo is a digital wallet

Inspection in detail is available for Packet’s behaviour, but unfortunately, there is no possibility or means to inspect a person’s

Infamous ransomware GandCrab could finally be on the way out, after white hats released yet another updated decryptor tool designed

Mark Thomas felt trouble brewing when he was a CIO with a CISO reporting to him as the pair stumbled

Another US university has been hit by a successful cyber-attack, this time potentially compromising personal information (PII) on hundreds of

Researchers discovered new malicious Android apps from Google Play Store bypassing SMS-based two-factor authentication (2FA) mechanisms and steal the OTP

Decryptor tool released for the notorious GandCrab ransomware let’s victim’s to unlock the files infected with any version of GandCrab.

Researchers discovered multiple vulnerabilities with some NETGEAR wireless routers that allow an attacker to access sensitive information. The vulnerability exists

Good news for the victims of the latest variants of the GandCrab ransomware, NoMoreRansomware released a free decryption tool. Victims

The cyber attack occurs on a daily basis, and these can range from attacks on tech giants to individuals falling

Venmo users are being advised to set their accounts to private after a computer science student scraped seven million Venmo

The remote identity proofing used by four large government agencies has been deemed outdated by a new report released by

Security researchers at Cofense have spotted a phishing campaign aimed at commercial banking customers distributing a new remote access trojan

Microsoft has urged Azure users to update their systems following the discovery of a major new attack campaign targeting popular

 
 

IT Security

Single Sign-on is a method of authentication process that helps to log in multiple application using single login credentials. Security

Every time you connect to the internet from a computer, tablet or smartphone, there is a growing risk of cyberattack.

Security leakage is a great concern when it comes to data migration. It not only hampers organizational reputation but can

TELECOM SECURITY

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information

Staffing remains an issue for security operations centers (SOCs), which continue to struggle with reporting and documentation while barely being

An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something

Industrial & OT Security

Opsec definition Operations security, or opsec, is a process by which organizations assess and protect public data about themselves that

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

In many organizations, traditional IT and critical Operational Technology (OT) networks are being merged to take advantage of the speed

CLOUD SECURITY

Cloud migration is the process of moving applications into the public and private cloud infrastructure to achieve cloud’s agility, resiliency

Containerization continues to gain popularity with many large enterprises, where thousands of new containers can be deployed every day. Containerization

Cloud Security Solutions is one of the challenging tasks while performing the cloud migration for any organization and they need

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...