Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
97%\ are concerned that attacks could cause operational shutdowns, and 96% believe they could impact the safety of their employees. → Read More
The surge in cryptominers started after the price of Bitcoin skyrocketed to $20,000. → Read More
A 31-point perception gap exists between male and female respondents, with 82% of men saying women have equal opportunities. → Read More
The group pledges to design offerings that prioritize security and privacy, commit to better user education and collaborate on info sharing. → Read More
ViperRAT 2.0 and Desert Scorpion represent a rare instance of a malicious APT in an official app marketplace. → Read More
High-severity vulnerabilities were found in 100% of tested banking and finance web applications. → Read More
Ten cyber-defense teams faced off in Orlando, competing as white-hat hackers to protect a fictional biotech company called Volitech. → Read More
Early Bird allows execution of malicious code before the entry point of a process, bypassing security products. → Read More
Fake cryptocurrency apps in the mobile app ecosystem exploit the names of well-known exchanges and mixers. → Read More
Some spend their money like legitimate earners typically do, but others tend to blow it on fast cars, hookers and drugs. → Read More
In 50% of cases over the past 12 months, organizations had insufficient endpoint or network visibility to respond successfully. → Read More
Just 15% of respondents believe that Google's decision to distrust Symantec certificates is a one-time event. → Read More
This marks the first time the UK has systematically and persistently attacked an adversary’s online efforts as part of a wider military campaign. → Read More
Enterprises are adopting the cloud much faster than their security teams can keep up with – and misunderstanding about cloud environments is pervasive. → Read More
More than two-thirds of organizations said that even if they detected a major incident, they would be unable to contain it within that same time frame. → Read More
The injectors modify HTTP headers on network requests with malicious code; the code then tricks captive portals into connecting to the internet. → Read More
More than a quarter (27%) of recipients clicked the link in mock phishing mails. → Read More
An elaborate fraud is bent on draining the bank accounts of large corporations. → Read More
It mines unsuspecting victim machines for Monero and other virtual currencies, but its most unusual characteristic is how cheap it is. → Read More
According to PureSec's audit, most vulnerabilities and weaknesses were caused by human error. → Read More