Jul 31, 2020

Compromised Employee Accounts Inflicted the Costliest Data Breaches Over the Past Year

A global study on the financial impact of data breaches revealed this week that cyber ...

Bitdefender Releases Landmark Open Source Software project - Hypervisor-based Memory Introspection

Bitdefender contributes unique technology to the open-source community  Hypervisor-based ...

Jul 30, 2020

92% of Security Teams Lack the Tools Needed to Close Security Gaps, Research Shows

A global survey of IT professionals reveals that the vast majority of organizations lack ...

Jul 29, 2020

Enterprises See Rise in Data Breach Costs, Shift in Security Spending Focus

A study of more than 5,500 companies within eight countries found that businesses affected ...

Jul 28, 2020

Study Links Cybersecurity Directly to Employee Stress and Exhaustion

A new study looked at why people make cybersecurity mistakes that can easily lead to ...

Jul 28, 2020

CISOs Who Close Critical Skills Gaps Stand the Best Chance of Minimizing the Impact of Cyberattacks

CISOs who reduce or close their critical IT departments’ skills gaps have the highest ...

Jul 27, 2020

Over 1000 Twitter Staff and Contractors Had Access to Internal Tools that Helped Hackers Hijack Accounts

As Twitter and law enforcement agencies investigate the high profile attack that saw a ...

Jul 27, 2020

Poor Privacy Practices Sharply Boost Likelihood of a Data Breach, Study Shows

Companies that don’t change their perception about data protection are increasing their odds ...

Jul 24, 2020

Routers Are Full of Vulnerabilities, But What If ISPs Could Fix That?

Imagine a world where routers with vulnerabilities are protected by the software running on ...

Jul 24, 2020

Cybersecurity Market Expected to Grow by 2.5% in Worst-Case Scenario

Cybersecurity spending will grow by 5.6% year-on-year in 2020, despite the financial ...

Jul 23, 2020

Raft of Healthcare Breaches Continue

Attacks targeting healthcare organizations just won’t let up. In early June, the University ...

Jul 22, 2020

Securing the Human Layer – The First Sane Step Towards Achieving a Strong Cybersecurity Posture

Employees typically access 59 risky URLs per week, or 8.5 per day, according to new data. ...

Jul 21, 2020

92% of Businesses Give Criminals Access to Customer Data through Vulnerable JavaScript Integrations

Sensitive data, like personally identifiable information (PII) and credit card information, ...

Jul 20, 2020

Report Says Data in the Cloud is Creating ‘Fear and Trust’ Issues for Security Professionals

A patchwork of tools, the presence of misconfigured services, and confusion around data ...

Jul 17, 2020

Media Is the Most Targeted Industry in Credential Stuffing Attacks

The media industry is a prime target for credential stuffing attacks, with more than 17 ...

Jul 17, 2020

Email Impersonation on the Rise as Workforce Grows Increasingly Distracted and Dispersed

Over a third of organizations are seeing email-based attacks hit their inbox daily, new data ...

Jul 16, 2020

HVI Blocks SIGRed, Prevents Zero-Day Execution from Suspicious Memory Regions

Windows DNS server remote code execution vulnerability permits full takeover of infected ...

MDR Creates New Revenue Opportunities for Managed Services Providers

Managed Detection and Response is one of the fastest growing areas of cybersecurity with a ...

Jul 15, 2020

SOC Employees Continue to Battle Stress and Skill Shortages, Study Finds

Security operations center (SOC) performance is getting worse, and the human element ...

Jul 14, 2020

Researchers Reveal the Countries Most Targeted by Cyberattacks

A study using data from the Center for Strategic and International Studies (CSIS) looked at ...

Jul 13, 2020

Most Companies Now Accept BYOD Policies But 30% Don’t Use Endpoint Protection for Those Devices

Bring your own device (BYOD) policies are changing around the world, and the latest report ...

Jul 10, 2020

One in 2 Companies Unable to Cope with Remote Work Security Risks

Half of infosec professionals in a recent Bitdefender study revealed that their organization ...

Jul 09, 2020

The Key Reason Why Some Enterprises Outright Refuse to Enable BYOD

Most IT professionals say employees are allowed to use personal devices for work. And while ...

Jul 09, 2020

Is Your Malware Detection Future-Proof? 7 Adaptable Technologies for Elusive Threats

While the media have extensively covered the recent spike in malware, a certain aspect seems ...

Jul 08, 2020

US Secret Service Warns of Attacks on MSPs

The United States Secret Service issued an advisory warning of an increase in cyberattacks ...

Jul 07, 2020

Businesses Now Spend a Third of Their Cybersecurity Budget on SOC

Organizations with a dedicated security operations center (SOC) know how much it helps ...

Jul 06, 2020

Many CIOs Believe Expired TLS Certificates Could Affect Their Business

Most Chief Information Officers (CIO) are worried about the security risks associated with ...

Jul 04, 2020

Are Companies Ready for the Risks of IoT?

The Internet of Things (IoT) and Industrial IoT (IIoT) are beginning to see some real ...

Jul 03, 2020

Why Vulnerable IoT Is a Double-Sided Problem for ISPs and Their Customers

A scan of the Japanese Internet infrastructure showed how many devices could be compromised ...

Jul 03, 2020

CISA and FBI Issue Advisory on Dealing with Tor Malicious Internet Traffic

The Cybersecurity Security and Infrastructure Security Agency (CISA) and the Federal Bureau ...

Jul 02, 2020

10 Stats About SOC Performance, Practices, and Analyst Attitudes in 2020

Recent studies show that the modern SOC has evolved to become the lynchpin for most ...

Jul 02, 2020

Remote Workers Encounter 8 Risky URLs per Day, New Research Shows

Given enough time, employees – especially those working remotely – will click on a link to a ...

Jul 01, 2020

DDoS Attacks Increase Almost 300% in Just One Year, Study Shows

DDoS attacks are on the rise at a time of the year that's usually a lot less uneventful, ...

Jul 01, 2020

Business Email Compromise (BEC) Attacks Jump 200 Percent from April to May

New data shows a sharp increase in monthly business email compromise (BEC) attacks focused ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW