Most SAP systems vulnerable to critical security configur...
Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, c...
New Drupal RCE vulnerability under active exploitation, p...
Yet another Drupal remote code execution vulnerability has been patched by the Drupal security team, who urge users to implement the offered updates immediat...
US Healthcare Firms Among Dozens Hit in 'Orangeworm' Cybe...
Attackers target healthcare organizations in apparent data theft mission, but could do far more damage, according to Symantec researchers.
Europe and Asia Take on More DDoS Attacks
While North American targets have historically been on the receiving end of the majority of DDoS attacks since their inception, that trend changed in 2017.
Release of PoC Exploit for New Drupal Flaw Once Again Put...
Only a few hours after the Drupal team releases latest updates to fix a new remote code execution flaw in its content management system software, hackers hav...
Tackle cyber threats in real time with the Micro Focus en...
In this podcast recorded at RSA Conference 2018, John Delk, Chief Product Officer and the General Manager of the security product group at Micro Focus, talks...
Gmail users can now send self-destructing emails
Google is slowly rolling out a number of changes for consumer Gmail users and G Suite users. Some of the changes improve usability and productivity, while ot...
Can existing endpoint security controls prevent a signifi...
Endpoint security solutions are failing to provide adequate protections to address today’s security threats, specifically malware, according to Minerva Labs....
The Default SAP Configuration That Every Enterprise Needs...
Nine out of ten organizations are vulnerable to a 13-year-old flaw that puts their most critical business systems at risk of complete criminal takeover.
Better code won’t save developers in the short run
According to OWASP, “Insecure software is undermining our financial, healthcare, defense, energy and other critical infrastructure.” In its 2017 OWASP Top 10...
Global AI business value to reach $1.2 trillion in 2018
Global business value derived from artificial intelligence (AI) is projected to total $1.2 trillion in 2018, an increase of 70 percent from 2017, according t...
New NSA/Cyber Command Head Confirmed by Senate
It's Lt. Gen. Paul Nakasone. I know nothing about him....
Third Critical Drupal Flaw Discovered—Patch Your Sites Im...
Damn! You have to update your Drupal websites. Yes, of course once again—literally it’s the third time in last 30 days. As notified in advance two days back,...
Atlanta's recovery highlights the costly mistake of being...
The Samsam attack against the city of Atlanta in March was chaotic and crippling. The ransomware, named for the group responsible for development and deploym...
5 signs you've been hit with an advanced persistent threa...
Advanced persistent threat (APT) hackers and malware are more prevalent and sophisticated than ever. APTs are professional hackers, working either for their ...
DDoS attacks in Q3 2018
In Q1 2018, we observed a significant increase in both the total number and duration of DDoS attacks against Q4 2017. The new Linux-based botnets Darkai (a M...
DDoS attacks in Q1 2018
In Q1 2018, we observed a significant increase in both the total number and duration of DDoS attacks against Q4 2017. The new Linux-based botnets Darkai (a M...
Hackers build a 'Master Key' that unlocks millions of Hot...
If you often leave your valuable and expensive stuff like laptop and passports in the hotel rooms, then beware. Your room can be unlocked by not only a malic...
Is “Malware of Mass Disruption” the WMD of the future? In...
ESET's Global Security Evangelist Tony Anscombe expands on his theory The post Is “Malware of Mass Disruption” the WMD of the future? Insights from the stage...
Five Network Security Pitfalls That Could Be Putting Your...
In a world where high-profile data breaches have become the norm, cyber security has quickly become a top priority for organisations of all sizes, in all ind...
What the EU’s General Data Protection Regulation Can Teac...
For anyone opening a tech industry publication in recent months, it’s been nearly impossible to miss headlines related to the EU’s upcoming General Data Prot...
Take back the initiative on DDoS protection – it’s time t...
Since Mirai and its subsequent variants let the genie out of the bottle, DDoS attacks powered by the Internet of Things have become ubiquitous. As more and m...
Can existing endpoint security controls prevent a signifi...
Endpoint security solutions are failing to provide adequate protections to address today’s security threats, specifically malware, according to Minerva Labs....
Life Under GDPR and What It Means for Cybersecurity
The General Data Protection Regulation (GDPR) is officially going into effect one month from today on May 25th, and its arrival will change how the internet ...
Dispelling the FUD: Key insights from the “GDPR for Dummi...
As the deadline for compliance approaches, the fear, uncertainty and doubt (FUD) surrounding the new General Data Protection Regulation (GDPR) legislation is...
Data and privacy breach notification plans: What you need...
Failure to report breaches within the rules of the many global data and privacy protection regulations can result in penalties. Planning ahead will help avoi...
Third parties can be your weakest security link
If a third party with access to your organisation’s systems suffers a breach, your data will be exposed too.It’s become a cliché in the information sec...
Amazon Alexa Flaw, Terror Charges for Turkish Journalists...
​​Security researchers find a flaw in the Amazon Alexa device to eavesdrop on people and record a transcript. Journalists for an opposition newspaper in Turk...
Mead #10 Security Envelopes Press-it Seal-it 4-1/8" X 9-1...
$3.95 End Date: Friday May-25-2018 7:40:12 PDT Buy It Now for only: $3.95 Buy It Now | Add to watch list
Gmail Privacy and Security Get Ruggedized
Google has rolled out a number of new features designed to make its G Suite collaboration and productivity apps more efficient and safer to use. G Suite curr...
New Tool for Building Blockchain Skills
Blockchain CTF helps pros build skills with simulations.
Free New Tool for Building Blockchain Skills
Blockchain CTF helps pros build skills with simulations.
Western Digital My Cloud EX2 NAS Device Leaks Files
Default configuration of WD’s My Cloud storage device keeps port open for unprivileged data exfiltration within a network.
Yahoo to Pay SEC Fine of $35 Million
While Yahoo senior management and legal team knew of the breach, the company failed to conduct due diligence for disclosing it to investors, the agency rules.
Google Adds Security Features to Gmail Face-lift
A redesigned Gmail brings new security measures to improve data protection and applications for artificial intelligence.
MyEtherWallet users robbed after successful DNS hijacking...
Unknown attackers have managed to steal approximately $150,000 in Ethereum from a number of MyEtherWallet (MEW) users, after having successfully redirected t...
IDG Contributor Network: Why data governance should be co...
Over the last eighteen months, we have been inundated by reports of businesses who have suffered from devastating data breaches. A majority of these incident...
In Trump's first year, FISA court denied record number of...
More surveillance orders were denied during President Donald Trump's first year in office than in the court's history.
Despite Risks, Nearly Half of IT Execs Don't Rethink Cybe...
A recent survey reveals a troubling degree of security inertia lurking among scores of organizations. But there are a few bright spots.
Third Critical Drupal Flaw Discovered—Patch Your Sites Im...
Damn! You have to update your Drupal websites. Yes, of course once again—literally it’s the third time in last 30 days. As notified in advance two days back,...
'Holy Grail' Exploit Puts Nintendo Switch Consoles at Risk
Devices built on Nvidia's Tegra X-1 mobile processor are at risk of attack from a flaw security researchers have revealed. The exploit chain discovered by Ka...
Metamorfo Targets Brazilian Users with Banking Trojans
In an unusual move, Metamorfo abuses legitimate, signed Windows binaries to load the malicious code.
Third Critical Drupal Flaw Discovered—Patch Your Sites Im...
Damn! You have to update your Drupal websites. Yes, of course once again—literally it’s the third time in last 30 days. As notified in advance two days back,...
'Webstresser' DDoS Attack Site Shut Down in International...
Investigators arrested the admins of Webstresser, the world's largest DDoS marketplace reportedly responsible for more than four million attacks.
Third Critical Drupal Flaw Discovered—Patch Your Sites Im...
Damn! You have to update your Drupal websites. Yes, of course once again—literally it’s the third time in last 30 days. As notified in advance two days back,...
Third Critical Drupal Flaw Discovered—Patch Your Sites Im...
Damn! You have to update your Drupal websites. Yes, of course once again—literally it’s the third time in last 30 days. As notified in advance two days back,...
Third Critical Drupal Flaw Discovered—Patch Your Sites Im...
Damn! You have to update your Drupal websites. Yes, of course once again—literally it’s the third time in last 30 days. As notified in advance two days back,...
Researchers discover next generation phishing kit
Researchers at Check Point and CyberInt, have discovered a new generation of phishing kit that is readily available on the Dark Web. A posting on the Dark Ne...
The best antivirus? Kaspersky leads in latest tests, but ...
The AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability...
Europol Smacks Down World’s Largest DDoS-for-Hire Market
Webstresser.org, a DDoS-for-hire market believed to be behind at least 4 million cyberattacks around the world, has served up its last internet-paralyzing tr...
Powered by Feed Informer