Experts spotted a piece of malware dubbed ZeroCleare that has been used in highly targeted attacks aimed at energy and

The python security team has removed two malicious python packages that introduced with the Python Package Index (PyPI) aimed to

Researchers discovered a previously unknown fully-featured Python RAT called”PiXie” escalate the Windows admin privilege to the ransomware in the healthcare

Wireshark 3.0.7 released with a number of security updates and fixed several other bugs that reside in the Wireshark components.

Ransomware attacks continue to threaten organizations worldwide, CyrusOne, one of the biggest data center providers in the US, is facing

Today, nine of the most exceptional new cybersecurity businesses will pitch their latest products and innovations aimed at securing the

Experts at Cisco Talos found two vulnerabilities in the GoAhead embedded web server, including a critical remote code execution flaw.

The FBI has confirmed to a US senator that the popular mobile application FaceApp could be a counter-intelligence risk because

Opening the 19th Black Hat Europe in London, founder Jeff Moss said that over the years the diversity of the

Delivering the opening keynote at Black Hat Europe, offensive security engineer Amanda Rousseau talked about the move from a defensive

Fraudsters are increasingly going back to basics in a bid to trick particularly elderly victims into handing over money, according

Researchers discovered a critical vulnerability in Microsoft Azure named “BlackDirect” that allows attackers to take over the Azure user’s accounts

A free holiday-themed cybersecurity conference set in a virtual North Pole is scheduled to take place for the second year

Most of us should start to think more carefully about the data that we put online. It is becoming clear

Over 90% of UK IT professionals believe Brexit will make chronic industry skills shortages even worse, according to new research

Companies that fail to set their IT security teams targets that directly correlate with overall business performance are causing problems

Cybersecurity has been listed as one of the challenges facing the United States Postal Service (USPS) in a semi-annual report

A new risk index has named Alaska as the state most vulnerable to cybercrime. The index was created by payments


IT Security

The first step for effective web design, as stated in an article by Forbes, is keeping the users in mind.

Californian security-event management company Sumo Logic has acquired JASK Labs, Inc. JASK makes security information and event management (SIEM) software

Proofpoint has entered into a definitive agreement to acquire ObserveIT for $225m. Extending its data loss prevention (DLP) capabilities with


In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any

What is an Indicator of Attack (IOA) IoA’s is some events that could reveal an active attack before indicators of

Industrial & OT Security

In the IoT Ecosystem, Not too long ago in history, the idea that people and objects could be inter-connected would

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last


CASB definition Think of cloud access security brokers (CASBs) as central data authentication and encryption hubs for everything your enterprise

Cloud migration is the process of moving applications into the public and private cloud infrastructure to achieve cloud’s agility, resiliency

Cloud Security Solutions is one of the challenging tasks while performing the cloud migration for any organization and they need



Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...