LATEST NEWS

A new massive database uncovered that contains nearly 49 million of Instagram Influencer’s, celebrities and brand account contact information leaked

The number of DDoS attacks increased by 84% in the first quarter of 2019 compared to Q4 2018, according to

The operating system of your computer is the most important part of your network that needs an update from the

A fifth of the world’s most popular Docker containers contain a security issue which could make them vulnerable to attack

KnowBe4 has announced the acquisition of CLTRe, adding the capability to measure security culture into its portfolio. Led by Kai

A recent MuddyWater campaign tracked as BlackWater shows that the APT group added new anti-detection techniques to its arsenal. Security

Good news for the victims of the JSWorm 2.0 ransomware, thanks to experts at Emsisoft they can decrypt their file

Encryption continues to be a challenge for companies, as only a quarter of organizations admit to using it for at-rest

Cyber-criminals continue to grow more sophisticated, developing advanced attack methods, including tailored ransomware, according to the Q1 Global Threat Landscape

If today’s cars are smartphones on wheels, then race cars are supercomputers with engines attached. As the fastest racing sport

IT services giant HCL left employee passwords exposed online, as well as customer project details, and other sensitive information, all

An online forum used by those involved in online account hijacking has been breached, according to KrebsonSecurity. An attack on

Most popular video app VidMate caught up for various malicious activities in their customers Android mobiles including drain users battery,

Security researchers from Chronicle, Alphabet’s cyber-security division, have spotted a Linux variant of the Winnti backdoor. Security experts from Chronicle,

A new data leak made the headlines, a database containing the contact information of millions of Instagram influencers, celebrities and

An identity thief can steal your sensitive information to commit fraudulent activities, such as file tax, apply for medical services

Security researchers from SRLabs have published a report that analyzed the risks for Ethereum network caused by unpatched Ethereum clients.

Salesforce is facing a huge outage, it shut down a good portion of its infrastructure due to change to the

 
 

IT Security

Managing the organization’s critical patches to keep computers up to date is very hard since there are hundreds of products

Good cybersecurity these days is more complicated than just matching signatures against known malware. In fact, many of the most

A vulnerability scanner is one of the essential tools in IT departments Since vulnerabilities pop up every day and thus

TELECOM SECURITY

If you don’t currently have your own security operations center (SOC), you are probably thinking of ways you can obtain

According to ESG research, 82% of cybersecurity professionals agree that improving threat detection and response (i.e. mean-time to detect (MTTD),

IoT Devices at a Risk

Security researchers at Senrio, an IoT focused security firm, have a discovered a stack buffer overflow vulnerability (CVE-2017-9765) in an

Industrial & OT Security

Opsec definition Operations security, or opsec, is a process by which organizations assess and protect public data about themselves that

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

In many organizations, traditional IT and critical Operational Technology (OT) networks are being merged to take advantage of the speed

CLOUD SECURITY

Containerization continues to gain popularity with many large enterprises, where thousands of new containers can be deployed every day. Containerization

Cloud Security Solutions is one of the challenging tasks while performing the cloud migration for any organization and they need

It’s no secret that most businesses and organizations work better when they embrace mobility. The old formula of having droves

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...