Compromised Employee Accounts Inflicted the Costliest Data Breaches Over the Past Year
A global study on the financial impact of data breaches revealed this week that cyber ...
Bitdefender Releases Landmark Open Source Software project - Hypervisor-based Memory Introspection
Bitdefender contributes unique technology to the open-source community Hypervisor-based ...
92% of Security Teams Lack the Tools Needed to Close Security Gaps, Research Shows
A global survey of IT professionals reveals that the vast majority of organizations lack ...
Enterprises See Rise in Data Breach Costs, Shift in Security Spending Focus
A study of more than 5,500 companies within eight countries found that businesses affected ...
Study Links Cybersecurity Directly to Employee Stress and Exhaustion
A new study looked at why people make cybersecurity mistakes that can easily lead to ...
CISOs Who Close Critical Skills Gaps Stand the Best Chance of Minimizing the Impact of Cyberattacks
CISOs who reduce or close their critical IT departments’ skills gaps have the highest ...
Over 1000 Twitter Staff and Contractors Had Access to Internal Tools that Helped Hackers Hijack Accounts
As Twitter and law enforcement agencies investigate the high profile attack that saw a ...
Poor Privacy Practices Sharply Boost Likelihood of a Data Breach, Study Shows
Companies that don’t change their perception about data protection are increasing their odds ...
Routers Are Full of Vulnerabilities, But What If ISPs Could Fix That?
Imagine a world where routers with vulnerabilities are protected by the software running on ...
Cybersecurity Market Expected to Grow by 2.5% in Worst-Case Scenario
Cybersecurity spending will grow by 5.6% year-on-year in 2020, despite the financial ...
Raft of Healthcare Breaches Continue
Attacks targeting healthcare organizations just won’t let up. In early June, the University ...
Securing the Human Layer – The First Sane Step Towards Achieving a Strong Cybersecurity Posture
Employees typically access 59 risky URLs per week, or 8.5 per day, according to new data. ...
92% of Businesses Give Criminals Access to Customer Data through Vulnerable JavaScript Integrations
Sensitive data, like personally identifiable information (PII) and credit card information, ...
Report Says Data in the Cloud is Creating ‘Fear and Trust’ Issues for Security Professionals
A patchwork of tools, the presence of misconfigured services, and confusion around data ...
Media Is the Most Targeted Industry in Credential Stuffing Attacks
The media industry is a prime target for credential stuffing attacks, with more than 17 ...
Email Impersonation on the Rise as Workforce Grows Increasingly Distracted and Dispersed
Over a third of organizations are seeing email-based attacks hit their inbox daily, new data ...
HVI Blocks SIGRed, Prevents Zero-Day Execution from Suspicious Memory Regions
Windows DNS server remote code execution vulnerability permits full takeover of infected ...
MDR Creates New Revenue Opportunities for Managed Services Providers
Managed Detection and Response is one of the fastest growing areas of cybersecurity with a ...
SOC Employees Continue to Battle Stress and Skill Shortages, Study Finds
Security operations center (SOC) performance is getting worse, and the human element ...
Researchers Reveal the Countries Most Targeted by Cyberattacks
A study using data from the Center for Strategic and International Studies (CSIS) looked at ...
Most Companies Now Accept BYOD Policies But 30% Don’t Use Endpoint Protection for Those Devices
Bring your own device (BYOD) policies are changing around the world, and the latest report ...
One in 2 Companies Unable to Cope with Remote Work Security Risks
Half of infosec professionals in a recent Bitdefender study revealed that their organization ...
The Key Reason Why Some Enterprises Outright Refuse to Enable BYOD
Most IT professionals say employees are allowed to use personal devices for work. And while ...
Is Your Malware Detection Future-Proof? 7 Adaptable Technologies for Elusive Threats
While the media have extensively covered the recent spike in malware, a certain aspect seems ...
US Secret Service Warns of Attacks on MSPs
The United States Secret Service issued an advisory warning of an increase in cyberattacks ...
Businesses Now Spend a Third of Their Cybersecurity Budget on SOC
Organizations with a dedicated security operations center (SOC) know how much it helps ...
Many CIOs Believe Expired TLS Certificates Could Affect Their Business
Most Chief Information Officers (CIO) are worried about the security risks associated with ...
Are Companies Ready for the Risks of IoT?
The Internet of Things (IoT) and Industrial IoT (IIoT) are beginning to see some real ...
Why Vulnerable IoT Is a Double-Sided Problem for ISPs and Their Customers
A scan of the Japanese Internet infrastructure showed how many devices could be compromised ...
CISA and FBI Issue Advisory on Dealing with Tor Malicious Internet Traffic
The Cybersecurity Security and Infrastructure Security Agency (CISA) and the Federal Bureau ...
10 Stats About SOC Performance, Practices, and Analyst Attitudes in 2020
Recent studies show that the modern SOC has evolved to become the lynchpin for most ...
Remote Workers Encounter 8 Risky URLs per Day, New Research Shows
Given enough time, employees – especially those working remotely – will click on a link to a ...
DDoS Attacks Increase Almost 300% in Just One Year, Study Shows
DDoS attacks are on the rise at a time of the year that's usually a lot less uneventful, ...
Business Email Compromise (BEC) Attacks Jump 200 Percent from April to May
New data shows a sharp increase in monthly business email compromise (BEC) attacks focused ...


