Feb 28, 2020

IT Managers Want Better VSaaS and ACaaS Solutions, Survey Shows

Physical security systems across Europe are not properly optimized and some of them need ...

Feb 27, 2020

Hiring, Training and Human Oversight Can Help Battle Insider Threats, US State Department Official Says

Insider threats present themselves in a variety of ways, and a person isn’t always ...

Feb 26, 2020

Exaggerated Lion and Business Email Compromise – Don’t Send That Check!

More and more businesses are falling victim to Business Email Compromise, where scammers ...

Feb 25, 2020

BEC Attacks Hit More Than 2,100 Companies throughout the US

A prolific and dangerous group called Exaggerated Lion has been hitting targets in the ...

Feb 24, 2020

Financial Account Security Causing the Greatest Angst, Survey Says

Since 2007, security services provider Unisys has measured the level of security concerns ...

Feb 21, 2020

Most UK Government Devices Lost or Stolen in 12 Months Were Unencrypted

More than 2,000 government mobile devices went missing in a recent 12-month period in the UK ...

Feb 20, 2020

Swiss Cybersecurity Body Urges Businesses to Stop Paying Ransomware Demands, Exposes Lax Security Practices

Switzerland’s Reporting and Analysis Centre for Information Assurance (MELANI) has issued an ...

Feb 19, 2020

More than 44 Million Patient Health Records Compromised in 2019 in the US

Data breaches in the healthcare industry are on the rise in the United States, and more ...

Feb 18, 2020

One for All and All-in-One: Regain Control of Your Security with Bitdefender and ThreatConnect®

From small companies losing their income to fraud to entire countries being robbed of their ...

Feb 18, 2020

Business Email Compromise Inflicts $1.7 Billion in Losses in US in 2019

The FBI's Internet Crime Complaint Center (IC3) has compiled all complaints registered in ...

Feb 17, 2020

Oil Industry Boosts Spending on Cybersecurity Five-Fold Since 2017

The Oil & Gas sector is investing aggressively in digital as the energy transition ...

Feb 14, 2020

Advanced Attack Groups Increasingly Threaten North American Electric Utilities

When it comes to critical infrastructure, there are few more essential than electricity ...

Feb 13, 2020

U.S. Healthcare System Attacked at Least 172 Times with Ransomware Since 2016

The healthcare industry is fighting a wave of ransomware attacks, as hackers constantly ...

Feb 12, 2020

Hackers Actively Targeting U.S. Supply Chain Companies, FBI Warns

The Federal Bureau of Investigation has issued a private industry notification warning ...

Feb 11, 2020

Explore the boundaries of the human element with Bitdefender at RSA 2020

One year back, Bitdefender was featured in Dark Reading’s series Cybersecurity and the Human ...

Feb 11, 2020

Majority of Developers are Concerned over the state of Their Application Security

While software developers are showing signs of high apprehension when it comes to the ...

Feb 10, 2020

Hypervisor Introspection Thwarts Web Memory Corruption Attack in the Wild

New remote memory corruption vulnerability in Internet Explorer browsers allows for full ...

Feb 10, 2020

Cyber Security Skills Gap is Becoming More of a Chasm

Every cyber security executive knows—or should know—that the current demand for skills is ...

Feb 07, 2020

Gaming Became Industry Most Affected by DDoS Attacks in 2019

Any organization with an online footprint is always exposed to DDoS (distributed ...

Feb 06, 2020

The 'Grass-is-Greener' Syndrome of Modern SOCs

While most enterprises recognize the critical role that security operation centers (SOC) ...

Feb 05, 2020

How Does a Business Become a Champion in Cyber Resilience?

Cyber threats lurk behind every corner, in every industry and geography. From ...

Feb 04, 2020

The Protocol That's Putting Enterprise IoT At Extreme Risk

A protocol little known by executives outside of the networking world may put the future ...

Feb 03, 2020

How to Mitigate the Most Common Cloud Vulnerabilities

The US National Security Agency (NSA) has published an important document outlining the main ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW