- Welcome Guest
- Sign In
Digital devices and home networks of corporate executives, board members and high-value employees with access to financial, confidential and proprietary information are ripe targets for malicious actors, according to a study released Tuesday by a cybersecurity services firm. The connected home is a ...
New research from Atlas VPN shows that cloud-native exploits on major cloud service providers (CSPs) declined during the first four months of 2022. Cloud-native exploits dropped by 25%, from 71 exploits in the first four months of 2021 to 53 exploits in the first four months of this year, Atlas rese...
Government organizations and educational institutions, in particular, are increasingly in hackers’ crosshairs as severe web vulnerabilities spiral upward. Remote code execution (RCE), cross-site scripting (XSS), and SQL injection (SQLi) are all top software offenders. All three increase or hov...
The security and operations analytics SaaS company hopes to disrupt legacy security ops with an artificial intelligence-driven approach to security operations built into its Resolution Intelligence platform.
Forrester also called out the work-from-anywhere trend as a major threat in 2022. It explained that an anywhere-work model presents an opportunity to create new kinds of sensitive data.
IT security firm NeoSystems last week announced it would host a panel of experts from the private and public sectors Tuesday centered around the cybersecurity implications of the ongoing conflict in Ukraine. TechNewsWorld sat in on the Zoom-delivered panel discussion.
The modern attack surface has grown too large and complex for security professionals to manage using traditional, manual approaches to the asset lifecycle.
Under the new Critical Infrastructure Defense Project, companies in particularly vulnerable industries -- such as hospitals and water and power utilities -- will have access to the full suite of Cloudflare's Zero Trust solution, CrowdStrike's endpoint protection and intelligence services, and Ping I...
Russian state-sponsored cybercriminals lurked for the last two years in numerous U.S Cleared Defense Contractors' networks stealing sensitive, unclassified information along with proprietary and export-controlled technology. The Federal Bureau of Investigation, Cybersecurity and Infrastructure Secur...
Four out of five cybersecurity pros are fretting over the potential for a sneak attack by an adversary with a quantum computer that will render the encryption on their data ineffective. Quantum computers can process data much faster than most computers today because they use qubits to crunch data, w...
New research from cloud security firm Ermetic shows that nearly all businesses have identities that, if compromised, would place at least 90 percent of the S3 buckets in their AWS account at risk. Ermetic conducted the study to determine the circumstances that would allow ransomware to make its way ...
Bot activity at websites is skewing marketing analytics and costing businesses millions annually, according to a study by bot detection and mitigation firm Netacea. The company maintained in its report that the skewed analytics problem is as costly to businesses as click fraud, which costs businesse...
'Tis the season to go phishing. Nothing brings out digital bandits like the holidays, and this year is no exception. Proofpoint, an enterprise digital security company, reports its researchers are seeing a massive global increase in holiday-themed mobile phishing attacks, a.k.a. smishing. It noted t...
Technical and logistical problems stretching across multiple industries gives both shoppers and retailers reason to double efforts to avoid being hacked this year. Two factors top the list: runaway inflation and increased cyberattacks.
Social Media
See all Social Media