Lack of Security in IoT Devices Explained. What Can We Do About It?

|
IoT security problems are not evident to regular users Top ten IoT security issues Exploring the most simple solutions ... Read More

Cybersecurity Professionals Feel Threatened by the Adoption of AI and Automation Tools, Survey Finds

|
AI, machine learning and automation aid in cybersecurity People feel threatened by the adoption of new technologies Cybersecurity specialists recommend their field as a career option ... Read More
Zoom Is Finally Testing Full End-to-End Encryption

Zoom Is Finally Testing Full End-to-End Encryption

Zoom finally announced that it’s starting to roll out end-to-end encryption (E2EE) for all users, marking a significant change in the security deployment of one of the most famous video-conferencing apps. The Zoom platform has had its share of problems amid its rise to fame, mostly due to the coronavirus ... Read More

Unprecedented Number of Cyberattacks Hit UK Businesses Amid Pandemic Lockdown

|
UK companies see a 13 percent increase in the number of cyberattacks The majority of attacks originate from China and Taiwan File-sharing applications were the main targets ... Read More
COVID-19-Related Emails Remain Prevalent in Phishing Campaigns

COVID-19-Related Emails Remain Prevalent in Phishing Campaigns

Coronavirus-related email subjects continue to dominate phishing campaigns, remaining the primary threat, with more than half of phishing emails containing some information related to the COVID-19 pandemic. Phishing campaigns represent a primary attack vector for cybercriminals looking tosteal personal information or infect devices with malware. The pandemic proved to be ... Read More
CISA and FBI Observed APT Groups Targeting State Networks Related to US Election Systems

CISA and FBI Observed APT Groups Targeting State Networks Related to US Election Systems

The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued an advisory after spotting advanced persistent threat (APT) actors exploiting multiple legacy vulnerabilities combined with a newer privilege escalation vulnerability—CVE-2020-1472—in Windows Netlogon. Less than a month before the November 3 elections in the United States, law agencies have detected ... Read More

More than Half of Employees Use Rogue Apps for Work, Survey Finds

|
Many organizations don’t monitor people working from home Some employees are unhappy with how the IT department is solving their problems The shadow IT security issue has only increased during the pandemic, with people using unsanctioned apps for work tasks ... Read More

New IoT Bots Reveal Why ISPs Have to Shoulder the Responsibility for Cybersecurity

|
New IoT botnets are always lurking on the horizon Users have an ever-increasing inventory of IoT devices to keep track off and it’s starting to become a hassle The protection of a smart home shouldn’t be the consumer’s full-time job ... Read More

New IoT Bots Reveal Why ISPs Have to Shoulder the Responsibility for Cybersecurity

|
New IoT botnets are always lurking on the horizon Users have an ever-increasing inventory of IoT devices to keep track off and it’s starting to become a hassle The protection of a smart home shouldn’t be the consumer’s full-time job ... Read More

Small Businesses and Consumers Grossly Underestimate Danger of Cyberattacks

|
Business owners don’t believe they are a likely victim in cyberattacks Many businesses still don’t have cyber insurance 40 % of regular consumers think they criminals never targeted them Consumers and businesses alike are underprepared to deal with existing or upcoming cyber threats. Surprisingly, according to a Nationwide Agent Authority ... Read More

DevSecOps Poll

Step 1 of 6

What is the biggest roadblock implementing DevSecOps practices?