75% choose “weak” passwords with no guidance on how to create a strong option.
84% of Cybersec Workers Would Consider Job Switch in 2018
Unmet expectations, high-demands for security skills and frequent contact from recruiters encouraging pros to look elsewhere
Researchers Warn of Mobile Blackmail Malware
RedDrop spyware records victims for later use, says Wandera
Researchers Warn of Mobile Blackmail Malware
RedDrop spyware records victims for later use, says Wandera
Suspected Avalanche Mastermind Re-Arrested in Kiev
Cybercrime-as-a-service network was disrupted in 2016
NSA: Trump’s Lukewarm Russia Response Will Embolden Putin
Expect more election interference, Cyber Command boss warns
Consumers Falling for Fake Mobile Banking Apps
More than one in three consumers are fooled by fraudulent versions of banking apps.
Threat Hunting Takes Center Stage for SOCs
Six out of ten organizations in the survey are planning to build out threat-hunting programs over the next three years.
AI Emerges as a Powerful Tool for Cyber-Threat Actors
Hivenets (clusters of compromised devices) have the ability to automatically identify and target additional vulnerable systems.
#CyberThreat18: NCSC on Threats and Attribution
NCSC talks threats, naming the actors and tracking their actions