LATEST NEWS

Global fraud attacks soared by 63% from the second half of 2018 to the first six months of this year,

The traditional risk management factors you are all taught include the staid process of categorizing potential threats and risks, evaluating

Researchers observed a new malware campaign using WAV audio files to hide the malware and to avoid detection. Threat actors

Researchers discovered a new track of ATM jackpotting attack through infamous ATM malware called “Cutlet Maker” which is now rapidly

Any business can experience security breaches at the software or network level. It’s common for headlines to report a virus

The Chinese government orchestrated a sophisticated multi-year cyber-espionage campaign to gain parity with western aerospace firms and help it build

Attackers are exploiting Docker Engine deployments that are exposed to the internet without authentication to deploy and run cryptojacking malware

Professionals from the cybersecurity industry have called for clarity regarding the role of Chief Information Security Officers (CISOs). Research from

A security vendor has detected over 100 million attacks on IoT endpoints in the first half of 2019 alone, highlighting

For more than two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of

Ransomware remains the dominant threat for business now, and will continue to be in the future. Speaking at the NTT

One of the web’s largest marketplaces for stolen card data has been hacked, leading to the theft the second time

Adobe released security updates that cover 82 vulnerabilities in various products, out of 82 vulnerabilities 45 are rated critical and

Chinese-speaking cybercrime gang Rocke, that carried out several large-scale cryptomining campaigns in past, has now using news tactics to evade

What a time to be alive. We have tons of information at the tips of our fingers, we can get

Researchers discovered a new malware campaign from the Winnti threat group that utilizes the supply-chain attacks with a new set

Largest underground store “BriansClub,” for buying stolen credit cards got hacked, over 26 million credit and debit card data extracted

A US mailing technology company and one of France’s largest media groups have been hit by ransomware over the past

 
 

IT Security

Web server pen testing performing under 3 major category which is identity, Analyse, Report Vulnerabilities such as authentication weakness, configuration

Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses

In 2008, Bernie Madoff admitted to masterminding an $80 billion Ponzi scheme — a scheme that should have made many

TELECOM SECURITY

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any

What is an Indicator of Attack (IOA) IoA’s is some events that could reveal an active attack before indicators of

Industrial & OT Security

In the IoT Ecosystem, Not too long ago in history, the idea that people and objects could be inter-connected would

Opsec definition Operations security, or opsec, is a process by which organizations assess and protect public data about themselves that

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

CLOUD SECURITY

In the latest major cloud security foul-up, Capital One suffered a data breach, which affected 100 million people in the

CASB definition Think of cloud access security brokers (CASBs) as central data authentication and encryption hubs for everything your enterprise

Research shows that organizations are moving systems and data to the cloud in rising numbers. Security when working in the

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...