Xbash has ransomware and coinmining capabilities. It also has self-propagating capabilities (meaning it has worm-like characteristics similar to WannaCry or…
The number of vulnerabilities reported in 2018 is 21% higher than last year, and total bug bounty payouts has increased…
WatchGuard’s Q2 2018 Internet Security Report uncovers cybercriminals’ heightened use of credential-focused attacks, the continued prevalence of malicious Office documents,…
Recent research by Palo Alto Networks Unit 42 Email Link Analysis (ELINK) has revealed that between April – June 2018,…
“It’s like watching a slow-motion governance train wreck.” Peter Coroneos, co-author According to the authors of the just published Cyber…
Cyberattackers are expanding their attack vectors to steal money, gain access to corporate and employee data Mimecast has announced the availability…
NIST has released the preliminary draft of Special Publication (SP) 1800-19A, Trusted Cloud: Security Practice Guide for VMware Hybrid Cloud…
We are excited to announce publication of the draft National Institute of Standards and Technology (NIST) Special Publication 1800-17: Multifactor Authentication for…
24% of Australian CIOs are planning to hire additional permanent IT professionals and 27% are planning to hire additional temporary/contract…
Cyber crime today is big business. Industry sources estimate it will cost the world a staggering US$6 trillion annually by…