September 26, 2023
Via: TechRadarA concerning amount of companies are pretty woeful in reporting the cyberattacks and breaches they suffer, both internally and externally. Research conducted by Keeper Security found that nearly half (48%) of the IT and security leaders it surveyed that have […]
August 25, 2023
Via: The Hacker NewsEvery company has some level of tech debt. Unless you’re a brand new start-up, you most likely have a patchwork of solutions that have been implemented throughout the years, often under various leadership teams with different priorities and goals. As […]
Application security, Security
March 8, 2023
Via: Help Net SecurityAfter combing through 350,000 reports to find 650 API-specific vulnerabilities from 337 different vendors and tracking 115 published exploits impacting these vulnerabilities, the results clearly illustrate that the API threat landscape is becoming more dangerous, according to Wallarm. Researchers came […]
January 27, 2023
Via: Help Net SecurityErmetic has extended its Cloud Native Application Protection Platform (CNAPP) with cloud workload protection capabilities that enable customers to detect, prevent and remediate security risks in virtual machines, containers and serverless functions. Using context that spans infrastructure configurations, network, access […]
Threats & Malware, Vulnerabilities
May 23, 2022
Via: Threat PostCompromised credentials and identities, third-party breaches, API attacks, and application exploits are all foundational entry points for today’s hackers. Recent months have brought many high-profile breaches from Samsung and Nvidia to Okta and the continued aftermath of Log4j. Still, ultimately, […]
March 25, 2022
Via: Security WeekYou may have heard there was a recent breach at a major cell phone provider, exposing the personal information of about 40 million people. And what was the public response to this outrage? They yawned. That hack was just one […]
August 13, 2021
Via: Help Net SecurityRansomware, mobile phone hacks, and other cyber-attacks are an everyday occurrence, making cybersecurity one of the most pressing concerns for companies around the world. C-suite executives must show leadership in driving a security culture to ensure that their company can […]
August 12, 2021
Via: Help Net SecurityWhile IT security decision makers often consider cyberattacks a serious concern and are allocating a significant share of their IT budget to address their cybersecurity challenges, data breaches have still been uncomfortably commonplace, an INTRUSION survey reveals. Cybersecurity IT budget […]
July 28, 2021
Via: Help Net SecuritySontiq released the Mid-Year 2021 Cybercrime Report, which highlights five key trends and the 2021 data breaches that pose the highest level of risk to victims. Companies are largely unprepared to fend off cyberattacks The report’s insights were derived from […]
April 30, 2021
Via: Natalie DunnWith cybercrime on the rise, thousands of cyber attacks and data breaches are recorded each day. The phenomenon is surely not showing any signs of slowing down, with several big cyber attacks making the headlines so far this year. In […]
Threats & Malware, Vulnerabilities
July 14, 2020
Via: Dark ReadingThird-party programs such as Google Analytics and other plug-ins expose websites to Magecart, formjacking, cross-site scripting, and credit-card skimming, and other attacks, new research shows. A report released today by Tala Security found that these kind of attacks exploit vulnerable […]
June 29, 2020
Via: Lawrence MaloneAlmost every U.S enterprise today uses the cloud in some way or fashion, and with good reason—it saves money spent on hardware, gives you all the performance you need, and the high availability of the cloud provides the peace of […]
Threats & Malware, Vulnerabilities
March 3, 2020
Via: Dark ReadingIn today’s increasingly crowded threat landscape, it can be difficult to determine which threats companies should prioritize. For those who are stuck, it’s helpful to consider what major organizations are worried about and the steps they’re taking to combat those […]
February 28, 2020
Via: CIOHigh-profile breaches have sparked interest in an emerging class of security software. The technology, named cloud security posture management (CSPM), scours cloud environments and alerts staff to configuration issues and compliance risks, most of which stem from human error. Exhibit […]
February 10, 2020
Via: CSO OnlineSince 2014, CIOs have flagged cybersecurity as either their first or second most important IT management issue in the venerable IT Trends Study from the Society for Information Management. Yet in 2013, cybersecurity came in just seventh in that same […]
December 23, 2019
Via: Security WeekThe statute becomes effective January 1, covering most entities doing business in California, just months after enforcement began for Europe’s General Data Protection Regulation, which affects many US online operations. The new law stems from a widespread effort to rein […]
February 13, 2019
Via: Security IntelligenceWhen the General Data Protection Regulation (GDPR) took effect last May, companies were seeking guidance and best practices to address their compliance challenges. Although this sense of urgency is beginning to diminish, the demand for data privacy controls will only […]
June 12, 2017
Via: Dark ReadingSecurity experts share the simplest and most effective methods bad guys employ to break into end-user devices. Phishing “Phishing is still the easiest way to compromise a user,” says Ragan. Spear phishing hits specific users with a malicious attachment; for […]
Application security, Vulnerabilities
February 3, 2017
Via: Help Net SecurityA new Bugcrowd study of one hundred CISOs revealed that 94 percent are concerned about breaches in their publicly facing assets in the next 12 months, particularly within their applications. As more applications become publicly accessible, more breaches are occurring […]
December 21, 2016
Via: Dark ReadingA survey of IT professionals by Hungarian security firm Balabit on the current status of their security investigations has revealed that though 75% of organizations set deadlines for probing and reporting breaches, 44% could not meet them last year – […]