LATEST NEWS

So, you want to break cryptography. Brute force attacks on cryptography could take billions of years, which no one has

PC manufacturer Asus recently announced that from June to November 2018, attackers used its Asus Live Update app, which comes

A database belonging to the Indian local search service JustDial was left online without protection exposing personal data of over

IT services outsourcing giant Wipro has been breached and some of its customers have been targeted by attackers as a

Researchers discovered a recent malvertising campaign from eGobbler threat actor that targets millions of iOS users to hijack their sessions

Around a fifth of all web traffic last year was linked to malicious bot activity, with financial services hit more

A new password and data stealing operation that has been targeting China has started to infect users worldwide, according to

The government department that is responsible for implementing the General Data Protection Regulation (GDPR) has committed an email faux pas

A new study from Outpost24 has discovered that almost one in four (23%) organizations do not carry out any form

Cyberattacks are always evolving and hackers are always one step ahead of enterprises. Ransomware, DDoS, Man-in-the-middle, Phishing and more, their

India’s Leading outsourcing giant Wipro Ltd confirmed that some of its employee accounts have been hacked in an advanced phishing

The UK’s National Cyber Security Centre (NCSC) has launched its latest annual search for the hottest cybersecurity start-ups in the

Scranos is a powerful cross-platform rootkit-enabled spyware discovered while investigating malware posing as legitimate software like video players, drivers and

Cyber security firm FireEye announced the release of FLASHMINGO, a new open source tool designed to automate the analysis of

Blue Cross of Idaho announced to have suffered a data breach, hackers accessed to the personal information of about 5,600

A spear-phishing email campaign targeting government entities in Ukraine could have been active as early as 2014, according to FireEye.

Data breaches have become ubiquitous in today’s businesses. In a world where companies of all shapes and sizes can become

Expert discovered an exploit that could allow ad blocking filter list maintainers for the Adblock Plus, AdBlock, and uBlocker browser

 
 

IT Security

Web server pen testing performing under 3 major category which is identity, Analyse, Report Vulnerabilities such as authentication weakness, configuration

When it comes to network security, the definition of those responsibilities has greatly evolved, just as the capabilities of networking

WPScan is a WordPress security scan for detecting and reporting WordPress vulnerabilities. WordPress is a free online Open source content

TELECOM SECURITY

IoT Devices at a Risk

Security researchers at Senrio, an IoT focused security firm, have a discovered a stack buffer overflow vulnerability (CVE-2017-9765) in an

News of the second Kmart credit-card breach in three years at the retailer and the number of breaches at financial

VoIP, short for Voice over Internet Protocol, allows businesses to make free, or very low-cost, telephone calls over the Internet.

Industrial & OT Security

In many organizations, traditional IT and critical Operational Technology (OT) networks are being merged to take advantage of the speed

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last

Microsoft last week unveiled Trusted Cyber Physical Systems (TCPS), a new solution designed to help protect critical infrastructure against modern

CLOUD SECURITY

It’s no secret that most businesses and organizations work better when they embrace mobility. The old formula of having droves

One thing is certain. Capitalism ensures that change is the new constant. In the early 1990s, internet pioneers Prodigy Communications

Cloud Adoption on the Rise, IT Pros Unsure of Risk Even though misconfigurations in public clouds create risks to enterprise

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...