Even well-funded firms still too reactive with security, according to Deloitte
New Sage Ransomware Shares Delivery with Locky
The overlapping infrastructure is a reminder of how malware support and distribution is frequently reused.
Metasploit Update Extends Pen Testing to IoT
Popular open source framework gets a hardware bridge
Cyber Expert: Vendor FUD Distorts Online Threats
National Cyber Security Centre director warns of marketing hype over APTs
Secrets Management: the Must-Dos
Getting a handle on secrets management is one of the No. 1 challenges in modern IT security.
PKI: Essential for Medical IoT
PKI can help three common scenarios that leave these critical pieces of infrastructure wide-open to hackers.
Ransomware Cripples Ohio County Government for Days
The Licking County government offices, including the police force, the county auditor’s office and the clerk of courts, have lost online access and landline telephones.
‘Coworker’ Phish Mails, Social Media Lures Fool Most Americans
68% of Americans were tricked by phishing emails that looked like they were from a coworker.
Auto-Provisioning for IoT Devices Tackles Security Gaps
DigiCert Auto-Provisioning is aimed at IoT device manufacturers, for provisioning digital certificates at scale.
Cellebrite Hack Highlights Dangers of State Snooping
Data extraction firm has a large target on its back