Featured

This Sneaky Phishing Technique Is Tricking Employees Into Installing Malware Or...

Security researchers are warning users about the increase in a particular phishing technique that tricks unsuspecting employees into performing malicious activities. This can include...

You Have 4 Days To Submit Your Equifax Data Breach Claim...

You have just a handful of days to file your claim if you're among the 147 million people whose data was exposed in the...

How AI And Cybersecurity Will Intersect In 2020

So much of the discussion about cybersecurity's relationship with artificial intelligence and machine learning (AI/ML) revolves around how AI and ML can improve security...

Aussie P&N Bank Suffers Data Breach

The Australian P&N Bank reported a data breach that exposed detailed and sensitive financial information on an unspecified number of customers. Access was gained...

‘Fleeceware’ Apps Downloaded 600M Times From Google Play

New research shows apps that dupe users into being charged excessively with little reward persist on the Android app store. Google has made a...

How SASE Improves Security Information, Event Management

Earlier this month, secure access service edge (SASE) vendor Cato announced a way for mid-size companies to deploy SIEM at a fraction of the...

Podcast: Meeting The Security Threats Of 2020

Bret Hartman has been in cybersecurity since he was a young Air Force lieutenant. Followed by stints at the NSA, IBM, and EMC. Along...

Windows Vulnerability: Researchers Demonstrate Exploits

A day after the U.S. National Security Agency disclosed a vulnerability that could affect the cryptographic operations in some versions of Microsoft Windows, security researchers...

Embedding Security, The Right Way

As organizations proceed to move their processes from the physical world into the digital, their risk profile changes, too – and this is not...

Kadena Launches Chainweb, A Hybrid Platform To Connect Public, Private Blockchains

Brooklyn-based startup Kadena has launched a hybrid blockchain that can scale horizontally, enabling multiple electronic ledgers to talk to each other via smart contracts – and...

Pocs For Windows Cryptoapi Bug Are Out, Show Real-Life Exploit Risks

Proof-of-concept exploit code is now available for the Windows CryptoAPI spoofing vulnerability tracked as CVE-2020-0601 and reported by the National Security Agency (NSA), just...

Big Prize Money Offered In Indian IT Ministry Cybersecurity Startup Challenge

India’s Ministry of Electronics & Information Technology (MeitY) and Data Security Council of India (DSCI) today launched the Cyber Security Grand Challenge, which will award INR 3.2 crore (approximately...

James Sample Named CSO At Xcel Energy

Xcel Energy announced that James W. Sample will join the company as Vice President, Chief Security Officer. Sample will lead the company’s security risk management program,...

Why Multicloud Security Is Your Next Big Challenge

Most companies who use cloud services to deploy applications, websites, databases and related solutions have a problem. While each cloud vendor may have a...

Pussycash Adult Webcam Data Breach Exposes Highly Sensitive Data Of Models

Thousands of adult webcam models have had their intimate details exposed online after a data breach involving the live webcam porn network, PussyCash. Those...

Insights About The First Five Years Of Right To Be Forgotten...

The “Right to be Forgotten” (RTBF) is a landmark European ruling that governs the delisting of personal information from search results. This ruling establishes...

Ako Ransomware Using Spam Attachments To Target Networks

Security researchers observed that Ako ransomware is using malicious spam attachments to go after organizations’ networks. On January 14, AppRiver Senior Cybersecurity Analyst David...

Windows 10 Has A Security Flaw So Severe The NSA Disclosed...

Microsoft released a patch for Windows 10 and Server 2016 today after the National Security Agency found and disclosed a serious vulnerability. It's a...

Whatsapp Update To Stop Users Taking Screenshots Of Private Chats

A new WhatsApp update seems set to stop people screenshotting their private conversations. The new feature – which comes as part of a suite of security changes,...

Broadening The Scope: A Comprehensive View Of Pen Testing

Penetration tests have long been known as a critical security tool that exposes security weaknesses through simulated attacks on an organization's IT environments. These...

Ryuk Ransomware Waking Up Powered-Down Devices To Encrypt Them

Security researchers observed the Ryuk ransomware using a special hardware feature to wake up powered-down devices in order to encrypt them. According to Bleeping Computer,...

Google To End Support For Third Party Cookies In Chrome

Google has announced plans to phase out support for third-party cookies in its Chrome web browser within the next two years. The company is joining the...

Texas School District Loses $2.3 Million To Phishing Scam, BECManor Independent...

Manor Independent School District (MISD) in Texas is investigating an email phishing attack after a series of seemingly normal school-vendor transactions resulted in the loss of...

Huawei: ‘No Smoking Gun’ In US’s 5G Dossier

The decision over whether or not to allow Chinese company Huawei to build 5G telecoms infrastructure has been much delayed and much agonised over....

2020 Outlook For Cybersecurity Legislation

As the partisan divide in Washington widens during this 116th Congress, the prospects of enacting any meaningful legislation that bolsters the nation’s cybersecurity seem,...

Microsoft Patches Critical ‘Nsacrypt’ Flaw Reported By NSA

Software giant Microsoft has released security patches for 49 vulnerabilities as part of the January 2020 Patch Tuesday. Out of these 7 have been...

Huawei Spending $26M To Court Developers To Build Apps For Its...

After being banned from US networks in 2019, Huawei reportedly plans to spend £20 million (around $26 million) to entice developers to create apps for its...

The Edge Cartoon Caption Contest: Latest Winners, New Toon ‘Like A...

It's that time again. Want to be the first Edge caption contest winner of the decade? Submit your caption for John Klossner's new cartoon...

APT40 Hacking Group Linked To 13 Alleged Front Companies In Hainan,...

The mysterious research group Intrusion Truth has unleashed a new series of reports claiming that 13 businesses based in the southern island province of Hainan, China are...

Equifax Settles Class-Action Breach Lawsuit For $380.5M

Class members have until Jan. 22, next week, to claim benefits. A Georgia court granted final approval for an Equifax settlement in a class-action...
2,787FansLike
2,172FollowersFollow
684FollowersFollow