Security researchers have uncovered a major new two-year state-sponsored attack against global telcos, most likely linked to China’s Ministry of

There’s been a 71% increase in open source-related breaches over the past five years, with UK firms downloading on average

The AV-TEST Institute, a Germany-based independent service provider of IT security and antivirus research, recently tested the six popular, business-focused

An online forum focused on discussion of all things social engineering has been breached, with the details of tens of

Researchers at Microsoft uncovered a malicious campaign that delivers the infamous FlawedAmmyy RAT directly in memory. Experts at Microsoft uncovered

Hacking software is not only used by hackers for criminal activities but it’s equally used by white hat hackers and

Researchers from Netlab, discovered a website offering free and commercial proxy servers leveraging a huge botnet (Ngioweb) of hacked WordPress

Problems for the popular file transfer service WeTransfer, its staff discovered that some file transfer emails were sent to the

Security teams can’t protect what they can’t see. While monitoring tools are getting better, end users and business managers need

Low-code and no-code development promises to speed up the deployment of new applications and to allow non-technical users to create

Over 600,000 Oregon residents have been told their personal information may have been compromised after a successful phishing campaign against

A US government security agency has ratcheted up tension with Iran by warning that escalating state-sponsored attacks could turn destructive.

A critical DLL hijacking vulnerability resides in PC-Doctor Dell Hardware Support Service software allows attackers to escalate the vulnerable systems

Researchers discovered a fake photo editing apps which are used by cybercriminals to launch MobOk Malware that takes complete control

NASA confirmed that hackers gained access to the Jet Propulsion Laboratory (JPL) last year and they able to steal 500MB

A new cryptocurrency-mining botnet malware is abusing Android Debug Bridge (ADB) and SSH, according to Trend Micro. “This attack takes

A new high-severity Kubernetes vulnerability has been discovered, according to security announcement on As part of the ongoing Kubernetes

Ethics and compliance programs are trending up, driven in large part by strong support from top executives, according to the


IT Security

Network Penetration Testing determines vulnerabilities on the network posture by discovering Open ports, Troubleshooting live systems, services, port scans and

Nmap is an open source network monitoring and port scanning tool to find the hosts and services in the computer

Cloud Computing Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from


Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information

Staffing remains an issue for security operations centers (SOCs), which continue to struggle with reporting and documentation while barely being

An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something

Industrial & OT Security

Opsec definition Operations security, or opsec, is a process by which organizations assess and protect public data about themselves that

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

In many organizations, traditional IT and critical Operational Technology (OT) networks are being merged to take advantage of the speed


Cloud migration is the process of moving applications into the public and private cloud infrastructure to achieve cloud’s agility, resiliency

Containerization continues to gain popularity with many large enterprises, where thousands of new containers can be deployed every day. Containerization

Cloud Security Solutions is one of the challenging tasks while performing the cloud migration for any organization and they need



Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...