Saudi Federation of Cybersecurity, Programming and Drones teams up with Black Hat organisers Informa Tech for world-class @Hack event to

Data Sharing Critical to AI’s Use in Cybersecurity Strategies for enabling the effective use of AI technologies in cyber-defense were highlighted by a

Cyber-Attack on Woodland Trust A charity that protects and restores woodland in England, Northern Ireland, Scotland, and Wales has been

South Carolina Plans Cyber-Ecosystem The University of South Carolina (UofSC) has struck up a partnership with the Palmetto State to

Government Security Supplier Suffers Double Breach A French cybersecurity company with government clients revealed this week that an unauthorized third

Financial Regulator Hit by 240,000 Malicious Emails in Q4 2020 The UK’s financial regulator was bombarded with nearly a quarter

Researchers from TIM’s Red Team Research (RTR) discovered 2 new zero-day vulnerabilities in WordPress Plugin Limit Login Attempts Reloaded Italy

HelpSystems Expands Cybersecurity Portfolio Through Latest Acquisition HelpSystems has announced a new acquisition to further boost its security product offerings.

American cybersecurity company White Ops announced today that it has been acquired by Goldman Sachs’ Merchant Banking Division in partnership with ClearSky Security and NightDragon. Terms of the transaction,

Microsoft security researchers have continued to investigate Solorigate which caused supply chain compromise and the subsequent compromise of cloud assets

It’s safe to assume that pretty much everyone is ready to move on from 2020. Between the COVID-19 pandemic, political battles, and

Google delivered over 33,000 alerts to its users during the first three quarters of 2020 to warn them of attacks

Threat researchers have spotted a new kind of cyber-attack that uses a variant of Mirai malware to target a port

Internal culture is a major determinant in how effective organizations’ cybersecurity practices and behaviors, according to a panel discussion at

GitHub launches a new code scanning tool that helps developers to detect vulnerability before the application reaches production. The tool

Researchers at an Israeli operational technology (OT) company have discovered multiple critical vulnerabilities in two popular industrial remote access software

The Cyber Readiness Institute (CRI) has expanded its partnership with the US Department of Homeland Security’s Cybersecurity and Infrastructure Security

Kylie Jenner’s makeup company has warned customers that their information may have been compromised in a recently detected security incident


IT Security

Ivanti has announced the acquisitions of mobile device management vendor MobileIron and secure access and VPN provider Pulse Secure. Under

ATM Penetration testing, Hackers have found different approaches to hack into the ATM machines. Programmers are not restricting themselves to

As cybersecurity leaders struggle with a mix of point solutions to defend against a wide range of vulnerabilities and endpoint


Our world is increasingly becoming digital as we are moving towards a society that is interconnected through a web of

SOC Training is one of the most important concern in order to build a Quality Security Operation Center Team to

What is an Indicator of Attack (IOA) IoA’s is some events that could reveal an active attack before indicators of

Industrial & OT Security

In the IoT Ecosystem, Not too long ago in history, the idea that people and objects could be inter-connected would

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last


IT firm Pure Storage has entered into a definitive agreement to acquire Portworx, a Kubernetes data services platform. The deal,

CASB definition Think of cloud access security brokers (CASBs) as central data authentication and encryption hubs for everything your enterprise

Cloud migration is the process of moving applications into the public and private cloud infrastructure to achieve cloud’s agility, resiliency



Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...