LATEST NEWS

Attackers targeting legacy protocols with stolen credential dumps to increase the speed and efficiency of the brute force attacks. Based

Security experts have been screaming at you for years to encrypt all network traffic. They have a point: Making a

Experts uncovered a watering hole attack against the Pakistani Govt’s passport application tracking site, hackers used the Scanbox Framework to

A third of the UK’s small companies have no cybersecurity strategy in place, according to new research designed to raise

Some of London’s top tourist attractions have seen a sharp increase in cyber-attacks over recent years, as hackers go after

UK intelligence agency GCHQ released emulators for World War II cipher machines (Enigma, Typex and The Bombe) that can be

In the aftermath of news that a vendor left the personal data of more than 800,000 blood donors exposed, Singapore’s

Before the next WannaCry or NotPetya cyber-attack strikes, potentially resulting in widespread damage for which few are actually prepared, law

DNS Attack is a type of cyber attack that exploit the weakness or vulnerability in Domain name system. Today, the

Threat actors targeted Office 365 and G Suite cloud accounts using the IMAP protocol to bypass multi-factor authentication (MFA). Over

Hackers exploiting zero-day vulnerabilities in Counter-Strike 1.6 game client to infect player’s devices by using a malicious gaming server and

Cyber criminals now approaching a unique way to spread Powload malware with the help of steganography to infect the targeted

Experts at the 360 Threat Intelligence Center uncovered a new malspam campaign that leverages the tragic Boeing 737 Max crash

The hacker gnosticplayers is offering the fourth batch of millions of records stolen from 6 new websites for sale on

Is this website safe ? In this digital world, Check website safety is most important concern since there are countless

Recent In-depth analysis against Android Antivirus in Google play store reveals that, 138 Android antivirus products are completely fake and

Secur Solutions Group data leak – Another clamorous data leak made the headlines, personal information of 808,201 blood donors in

Security researchers discovered 257,287 legal documents from unprotected Elasticsearch cluster that hosted on a US-based Amazon AWS server. The unprotected

 
 

IT Security

Choosing the Best Android Antivirus app is the most important concern to protect your Android device from sophisticated cyber threats.

Lynis is an open source security auditing tool. Its main goal is to audit and harden Unix and Linux based

For many organizations, endpoint security remains the weak link in their security strategy. While organizations are able to ensure that

TELECOM SECURITY

IoT Devices at a Risk

Security researchers at Senrio, an IoT focused security firm, have a discovered a stack buffer overflow vulnerability (CVE-2017-9765) in an

News of the second Kmart credit-card breach in three years at the retailer and the number of breaches at financial

VoIP, short for Voice over Internet Protocol, allows businesses to make free, or very low-cost, telephone calls over the Internet.

Industrial & OT Security

In many organizations, traditional IT and critical Operational Technology (OT) networks are being merged to take advantage of the speed

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last

Microsoft last week unveiled Trusted Cyber Physical Systems (TCPS), a new solution designed to help protect critical infrastructure against modern

CLOUD SECURITY

It’s no secret that most businesses and organizations work better when they embrace mobility. The old formula of having droves

One thing is certain. Capitalism ensures that change is the new constant. In the early 1990s, internet pioneers Prodigy Communications

Cloud Adoption on the Rise, IT Pros Unsure of Risk Even though misconfigurations in public clouds create risks to enterprise

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...