News
  • "Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds"

    A report recently released by Sophos, titled “Exposed: Cyberattacks on Cloud Honeypots”, highlights the speed at which a cloud server honeypot was attacked by cybercriminals, the average number of attempted attacks on cloud servers per minute, and more.…

  • "DevSecOps: Fast Development Without Sacrificing Safety"

    DevOps is a set of practices that have been increasingly adopted by organizations to increase the speed at which software is developed and delivered. However, organizations are encouraged to adopt DevSecOps in which security is considered at every stage…

  • "Cyberspies Hijacked the Internet Domains of Entire Countries"

    A hacker group, called Sea Turtle, has been discovered by researchers at Cisco's Talos security devision to be carrying out an espionage campaign primarily targeting government organizations in the Middle East and North Africa, including intelligence…

  • "Malvertising Campaign Abducts Half a Billion Chrome on iOS Sessions to Push Fake Ads"

    Confidant, an IT security firm, recently published a blog post in which the details of a malvertising campaign, dubbed eGobbler, are presented. According to researchers, eGobbler, abused a vulnerability in Chrome for iOS. Through the exploitation of this…

  • "Army Researchers Identify New Way to Improve Cybersecurity"

    Cyberattacks pose a significant threat to the security and privacy of individuals, government agencies, and businesses, making cybersecurity one of the biggest concerns of the nation. A new way in which network security can be improved has been…

  • "Cloud Security Spending Set to Top $12bn by 2023"

    A greater amount of companies are starting to use cloud services.  Organizations spent $178 billion on public cloud services last year, and the amount of money spent on public cloud services is expected to grow to $236 billion by…

  • "Hackers Could Read Your Hotmail, MSN, and Outlook Emails by Abusing Microsoft Support"

    Microsoft has confirmed that some of its email service users were the targets of an attack sometime between January 1st and March 28th. Hackers were able to access the contents of users' email accounts through the abuse of Microsoft's customer…

  • "Researchers in Singapore Demonstrate New Quantum Key Distribution Technique over Singtel's Fibre Network"

    A breakthrough in quantum key distribution (QKD) has been made by a team of researchers from the National University of Singapore (NUS) and Singtel, Asia's leading communications group. QKD differs from traditional encryption in that it is uses the laws…

  • "Experts Explore Mystery of Security Metrics"

    The AFCEA Cyber Committee explored the area of security metrics by surveying and interviewing organizations with cybersecurity programs. The results from these surveys and interviews further highlight that measuring the adequacy of cybersecurity…

  • "New Attacks (and Old Attacks Made New)"

    In todays world new malware and zero-day attacks are reasonably rare and are vastly outnumbered by reconfigured malware and the regular return of old attacks.  It is important to be prepared for the new attacks, however it is also very important to…

  • "Aftershock-3PC: Polymorphic Malware Attack on 200+ Premium Publishers"

    A new form of malware targeting ad networks, called AfterShock-3PC, is said to have been designed to circumvent signature-based detection in that it continuously alters its identifiable features. According to the Digital Security and Operations (DSO)…

  • "TicTocTrack Smartwatch Flaws Can Be Abused to Track Kids"

    Researchers at Pen Test Partners have uncovered vulnerabilities contained by a popular Australian smartwatch for kids, called TicTocTrack. Parents can track the location of their children via the smartwatch. According to researchers, the vulnerabilities…