There was a threefold increase in encrypted communication used by malware in last 12 months.
Risk and Compliance Management Moves Towards Collaboration
A survey shows a greater need for collaboration on defense, monitoring and recovery across IT, security and compliance functions.
#TEISS18: Phishing Trends and their Impact on Future Risks
What phishing patterns tell us about coming threats
C-Level Prioritizes Breach Costs Over Customer Losses
Centrify study also claims CEOs are too focused on malware threat
#TEISS18: Cybersecurity – Myths Versus Reality
Don’t be blinded by cybersecurity myths, focus on the real-world scenarios
Bot-Driven Credential Stuffing Hits New Heights
Over two-fifths of login attempts are malicious and automated, says Akamai
UK’s Top Uni Students to Compete in Ethical Hacking Challenge
Inter-ACE competition returns as government launches skills fund
Tesla Falls to Crypto-Jackers
Hackers also gained unfettered access to nonpublic Tesla information stored in Amazon S3 buckets, including vehicle telemetry.
North Korean Threat Widens to Target Multinationals
Reaper has now graduated to the level of an advanced persistent threat.
Twitter Pornbots Hijack Company Hashtags
The bots tweet at a rapid cadence, with some tweeting more than 50 times per day and more than 10,000 overall.