LATEST NEWS

Microsoft released a security update for November 2019 under patch Tuesday and fixed 74 security vulnerabilities that affected various Microsoft

PortSwigger has launched a free interactive training platform in an attempt to address the global shortage of cybersecurity talent. The

Internal passwords belonging to American retailer Orvis were twice leaked online in a double data breach. Credentials belonging to the

CloudSploit has been acquired by Aqua Security for an undisclosed sum. Aqua Security, the leading platform provider for securing container-based,

The recently discovered ransomware-as-a-service (RaaS) Buran attempts to gain popularity by offering discounted licenses. In May, researchers from McAfee’s Advanced

The UK Labour Party has stated that it has been hit by a “sophisticated and large-scale cyber-attack” on its digital

Researchers uncovered a new ransomware family named “Buran” ransomware that works as a Ransomware-as-a-Service(RaaS) model and actively selling in a

A new wave of BitPaymer Ransomware attack several MSSP based companies in Spain through compromised websites, and it’s using various

Two new carding bots that pose a threat to e-commerce platforms have been detected at the start of the busiest

A fine of $1.6m has been meted out to the Texas Health and Human Services Commission for unintentionally exposing the

A major US hosting provider has been hit by a serious ransomware attack, impacting hundreds of thousands of customers. SmarterASP.NET

Researchers discovered nearly 49 malicious Android Adware Apps from Google play store related to games & stylized cameras, and these

This past quarter we observed a new DDoS attack that confirmed our earlier hypothesis regarding attacks through the Memcached protocol.

The Apple Mail app available on macOS stores leaves a portion of users encrypted emails in plaintext in a database

This is really an embarrassing incident, ZoneAlarm forum site has suffered a data breach exposing data of its discussion forum

A black hat selling vulnerabilities can make as much money as a white hat researcher using bug bounty programs, or

Researchers discovered a mass malware distribution campaign that utilizing the well-known political figures in the U.S. including President Donald Trump,

Another day, another victim of a ransomware attack, this time major ASP.NET hosting provider SmarterASP announced it was infected by

 
 

IT Security

Californian security-event management company Sumo Logic has acquired JASK Labs, Inc. JASK makes security information and event management (SIEM) software

Proofpoint has entered into a definitive agreement to acquire ObserveIT for $225m. Extending its data loss prevention (DLP) capabilities with

Web server pen testing performing under 3 major category which is identity, Analyse, Report Vulnerabilities such as authentication weakness, configuration

TELECOM SECURITY

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any

What is an Indicator of Attack (IOA) IoA’s is some events that could reveal an active attack before indicators of

Industrial & OT Security

In the IoT Ecosystem, Not too long ago in history, the idea that people and objects could be inter-connected would

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last

CLOUD SECURITY

CASB definition Think of cloud access security brokers (CASBs) as central data authentication and encryption hubs for everything your enterprise

Cloud migration is the process of moving applications into the public and private cloud infrastructure to achieve cloud’s agility, resiliency

Cloud Security Solutions is one of the challenging tasks while performing the cloud migration for any organization and they need

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...