LATEST NEWS

Over two millions users of a gaming company and a cryptocurrency specialist have become the latest “netizens” to have their

Opening the 11th Irisscon conference in Dublin, Brian Honan, CEO of BH Consulting and head of the Irish Reporting and

Patient care at a large hospital in northern France has suffered considerably after a major ransomware attack at the weekend,

Security experts discovered a new peer-to-peer (P2P) botnet dubbed Roboto that is targeting Linux servers running unpatched Webmin installs. Researchers

A new wave of Roboto Botnet activities being discovered that attack the Linux Webmin servers by exploiting the RCE vulnerability

Microsoft has taken the unusual step of issuing a statement to deny what it claims to be misleading reports about

Global IT security skills shortages have now surpassed four million, according to (ISC)2. The certifications organization compiled its latest Cybersecurity

Researchers discovered a critical vulnerability in Docker that allows an attacker to take complete control of the host and the

The Infosecurity ISACA North America Expo and Conference got off to a suitably heady start today with its opening keynote,

Over 100,000 people were targeted by a large-scale summer threat campaign using fake IRS websites. The extensive phishing campaign was

Security researchers are urging Docker customers to upgrade to the latest version after detailing a proof-of-concept (PoC) attack exploiting a

A US cybersecurity conference focused on protecting power and utilities is tripling the number of events it will stage next

At Infosecurity ISACA North America Expo and Conference in New York this week Ken Munro, partner at Pen Test Partners,

Speaking at Infosecurity ISACA North America Expo and Conference in New York, Marc Keating, senior sales engineer at Arctic Wolf

The anti-virus industry has teamed up with victim support groups in a new anti-stalkerware alliance focused on shutting down the

New malspam email campaign discovered with fake windows updater and its Builder, through which hackers launching Cyborg Ransomware to encrypt

New data leak threatens the world of finance after the Panama Papers, hackers published 2TB of the Cayman National bank’s

Ransomware accounted for over half of all malicious mailings in H1 2019, Troldesh aka Shade being the most popular tool

 
 

IT Security

Californian security-event management company Sumo Logic has acquired JASK Labs, Inc. JASK makes security information and event management (SIEM) software

Proofpoint has entered into a definitive agreement to acquire ObserveIT for $225m. Extending its data loss prevention (DLP) capabilities with

Web server pen testing performing under 3 major category which is identity, Analyse, Report Vulnerabilities such as authentication weakness, configuration

TELECOM SECURITY

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any

What is an Indicator of Attack (IOA) IoA’s is some events that could reveal an active attack before indicators of

Industrial & OT Security

In the IoT Ecosystem, Not too long ago in history, the idea that people and objects could be inter-connected would

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last

CLOUD SECURITY

CASB definition Think of cloud access security brokers (CASBs) as central data authentication and encryption hubs for everything your enterprise

Cloud migration is the process of moving applications into the public and private cloud infrastructure to achieve cloud’s agility, resiliency

Cloud Security Solutions is one of the challenging tasks while performing the cloud migration for any organization and they need

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...