NEWS

Open source breaches increase 71%

Largest ever DevSecOps survey shows 41% of executives not implementing open source governance in their companies.

Read More

NEWS

Fifty percent increase in Botnet stolen credentials

Blueliv, a leading enterprise-class cyberthreat intelligence company, has launched its 2018-2019 Annual Cyberthreat Landscape Report providing insights into emerging and evolving cybersecurity trends. The report reveals that botnet stolen credentials increased by a staggering fifty percent in 2017-2018, with technology and telco sectors being the target for over half of those stolen.

Read More

NEWS

IoT devices under constant attack

Cyxtera Technologies has released findings from an extensive research project, the “Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots,” showing that IoT devices are under constant attack; more than 150 million connection attempts over 15 months. The report reveals the detection of new attacks on IoT devices, especially those leveraging zero-day vulnerabilities for specific devices. The research was a joint effort by Cyxtera threat researcher Martin Ochoa and...

Read More

NEWS

Companies stuck in continuously reactive cybersecurity response cycle

IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a rapidly-growing array of technology solutions. Ideally, business requirements would be the key motivator for an organisation’s approach to cybersecurity strategy. But, nearly two out of three U.K.-based IT and security decision makers say their security programme is continuously reactive due to constantly changing...

Read More

NEWS

Cybercriminals earning over $3B annually exploiting social platforms

Ready availability of hacking tools, wildfire spread of malware and proliferation of cryptomining has seen social media-enabled cybercrimes grow by more than 300-fold.

Read More


Nixu Corporation and Nokia Networks have entered an agreement to collaborate on developing and...
Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...
Despite 59% of cybersecurity professionals saying the widening workforce gap puts their...
Extortion demands grew in 2020, as cyber criminals targeted new online industries.
The year 2015 has become widely referred to as the year of the data breach. What nefarious...
Palo Alto Networks® and VMware, Inc. have announced a partnership backed by a new...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more