Source: itsecurityguru.org

Organisations need a zero trust model for cyber security, Unisys survey finds

Organisations need a zero trust model for cyber security, Unisys survey finds

Stronger and more frequent brute force attacks are now the norm

Stronger and more frequent brute force attacks are now the norm

Kaspersky Lab discovers Rakhni Trojan’s ability to choose between being a miner or cryptor when infecting a victim

Kaspersky Lab discovers Rakhni Trojan’s ability to choose between being a miner or cryptor when infecting a victim

Millions of Websites Using HTTP Maybe Labelled “Not Secure” with July Google Chrome Update

Millions of Websites Using HTTP Maybe Labelled “Not Secure” with July Google Chrome Update

F5 Labs research reveals Chinese hackers lead attacks on IoT devices

F5 Labs research reveals Chinese hackers lead attacks on IoT devices

New vulnerabilities in Phoenix Contact switches endanger industrial networks

New vulnerabilities in Phoenix Contact switches endanger industrial networks

Android users targeted by popularity-faking tricks on Google Play

Android users targeted by popularity-faking tricks on Google Play

Cybercriminals target job listing portals to recruit unwitting mules for fraud

Cybercriminals target job listing portals to recruit unwitting mules for fraud

Who could launch the ultimate cyberattack against America?

Who could launch the ultimate cyberattack against America?

Europe’s cybersecurity finest failing on email security basics

Europe’s cybersecurity finest failing on email security basics

Terros Health warns of patient data breach

Terros Health warns of patient data breach

For enterprise cyber defence, there should be more than one solution

For enterprise cyber defence, there should be more than one solution

Positive Technologies investigation: Cobalt-like attacks continue

Positive Technologies investigation: Cobalt-like attacks continue

Solving the problem of insider threats to enterprise cybersecurity

Solving the problem of insider threats to enterprise cybersecurity

Beware the Black Axe Gang: Business Email Compromise Campaigns Observed in 2017

Beware the Black Axe Gang: Business Email Compromise Campaigns Observed in 2017

Attacks leveraging exploits for Microsoft Office grew fourfold in early 2018

Attacks leveraging exploits for Microsoft Office grew fourfold in early 2018