LATEST NEWS

Auctions platform LiveAuctioneers admitted to have suffered a data breach that likely impacted approximately 3.4 million users. Auctions platform LiveAuctioneers

Analysis of the Alexa top 1000 websites has revealed a troubling lack of security controls required to prevent data theft

The MGM Resorts 2019 data breach is much larger than initially thought, a hacker is offering for sale details of

Security researchers have warned video conferencing users not to post screen images to social media after they managed to unmask

SAP released updates for critical security vulnerability found in the SAP NetWeaver AS JAVA (LM Configuration Wizard) versions 7.30 to

A lack of diversity and excessive workplace pressure are two of the top challenges for the IT security industry, according

Security researchers have discovered a database containing millions of emails and usernames up for sale on the dark web, linked

The U.S. Department of Homeland Security is merging its Electronic Crimes Task Forces (ECTFs) and Financial Crimes Task Forces (FCTFs)

Park Place Technologies, a global IT leader focused on optimizing data centers and IT infrastructure for 17,000 customers, today announced

The United States Army has expressed interest in kitting out its principal investigative division with cryptocurrency tracing tools. In a

Cyber-criminals have compromised a British cryptocurrency exchange, making off with over $3m in Bitcoin. Cashaa has halted all its crypto-related

The United States Secret Service has announced the creation of a new network of task forces to tackle both traditional

Virtual private networks are an essential tool for any business that enables workers to connect to their corporate network remotely.

Antwerp-based savings bank Argenta has fallen victim to what is believed to be Belgium’s first jackpotting attacks. Also known as

At least 39 different organizations hold personal data of the average UK citizen, providing a wide-range of opportunities for hackers

An exercise which will enable small businesses to test their cyber resilience while staff work remotely has been launched by

Security experts at threat intelligence firm Cyble have identified a credible actor selling personal details of approximately 40,000 US citizens.

Cybersecurity solutions company Trend Micro has announced that it is expanding its partnership with non-profit community Girls in Tech with

 
 

IT Security

A Vulnerability Scanning Tools is one of the essential tools in IT departments Since vulnerabilities pop up every day and

Spyse is a cybersecurity search engine that has caught the attention of many pentesters due to its unique data-gathering design.

Navigating through the web can seem like a minefield. It looks like new threats emerge daily, and people need to

TELECOM SECURITY

Our world is increasingly becoming digital as we are moving towards a society that is interconnected through a web of

SOC Training is one of the most important concern in order to build a Quality Security Operation Center Team to

What is an Indicator of Attack (IOA) IoA’s is some events that could reveal an active attack before indicators of

Industrial & OT Security

In the IoT Ecosystem, Not too long ago in history, the idea that people and objects could be inter-connected would

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last

CLOUD SECURITY

CASB definition Think of cloud access security brokers (CASBs) as central data authentication and encryption hubs for everything your enterprise

Cloud migration is the process of moving applications into the public and private cloud infrastructure to achieve cloud’s agility, resiliency

Cloud Security Solutions is one of the challenging tasks while performing the cloud migration for any organization and they need

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...