
Top 5 Bug Bounty Programs to Watch in 2021
While Gartner does not have a dedicated Magic Quadrant for Bug Bounties or Crowd Security Testing yet, Gartner Peer Insights already lists 24 vendors in […]

Over 3 billion emails and passwords hacked in possibly the largest breach ever
Hacker harvest 2021 has begun. According to CyberNews, 3.27 billion unique pairs of emails and passwords were leaked on a popular hacking forum, aggregating past […]

Critical Cisco Flaws Open VPN Routers Up to RCE Attacks
The vulnerabilities exist in Cisco’s RV160, RV160W, RV260, RV260P, and RV260W VPN routers for small businesses. Mit dem Laden des Tweets akzeptieren Sie die Datenschutzerklärung […]

Highlights of the Cybersecurity Standardisation Conference
The 2021 edition of the Conference presented the developments and upcoming challenges in European standardisation under the Cybersecurity Act. The European Standards Organisations, CEN, CENELEC […]

Ransomware Newcomers Include Pay2Key, RansomEXX, Everest
Maze May Have Exited, But Fresh Gangs Arrive Bearing Dedicated Data-Leaking Sites https://www.bankinfosecurity.co.uk/ransomware-newcomers-include-pay2key-ransomexx-everest-a-15908 […]

3 New Severe Security Vulnerabilities Found In SolarWinds Software
Cybersecurity researchers on Wednesday disclosed three severe security vulnerabilities impacting SolarWinds products, the most severe of which could have been exploited to achieve remote code […]

Zero-day vulnerability in SonicWall products actively exploited in the wild
The warning comes following a cyber-attack on the network security company last month A zero-day vulnerability in SonicWall enterprise security products is being actively exploited […]

So, What’s So Special About the Newest Ransomware?
We were just a few days into the new year. We had hoped that this year will definitely be our year. We had hoped that […]

Android Gets Its New Malware for the Year
Not a day goes by without a piece of malware news. Today is no exception. A new family of Android ransomware has been revealed by […]

5G Cybersecurity (Preliminary Draft)
Announcement NIST’s National Cybersecurity Center of Excellence (NCCoE) has posted for comment a preliminary draft—the first of three volumes of an upcoming practice guide on 5G cybersecurity. […]

World’s most dangerous malware EMOTET disrupted through global action
Law enforcement and judicial authorities worldwide have this week disrupted one of most significant botnets of the past decade: EMOTET. Investigators have now taken control […]

International Action Targets Emotet Crimeware
Authorities across Europe on Tuesday said they’d seized control over Emotet, a prolific malware strain and cybercrime-as-service operation. Investigators say the action could help quarantine more […]

Biometric data: 50 countries ranked by how they’re collecting it and what they’re doing with it
From passport photos to accessing bank accounts with fingerprints, the use of biometrics is growing at an exponential rate. And while using your fingerprint may […]

Web Application Attacks on Healthcare Spike 51% As COVID-19 Vaccines are Introduced
As the first vials of COVID-19 vaccines were disseminated in December, Imperva Research Labs monitored an astounding 51% increase in web application attacks on healthcare targets. The […]

BeyondCorp Enterprise: Introducing a safer era of computing
Security issues continue to disrupt the status quo for global enterprises. Recent incidents highlight the need to re-think our security plans and operations; attackers are […]

Russian hack of US agencies exposed supply chain weaknesses
The elite Russian hackers who gained access to computer systems of federal agencies last year didn’t bother trying to break one by one into the […]