Security news

The latests cybersecurity news

15 minutes agoBreach Investigations: The Detective's View
Kenrick Bagnall of Toronto Police on How to Be Prepared for CybercrimeKenrick Bagnall, a former IT executive who is now a detective constable with the Toronto Police, offers unique insights on public/...
15 minutes agoMassachusetts HIPAA Case Outlines Series of Missteps
$230,000 in Penalties After Two Insider BreachesA HIPAA-related enforcement case in Massachusetts involving two insider breaches alleges a trail of missteps, including failure to take prompt action af...
an hour agoFuture-Proofing for IoT Risks
Check Point's Robert Falzon on Preparing for the Changes to ComeThe internet of things promises to change how enterprises operate - as well as the cybersecurity risks they will face. Robert Falzon of ...
an hour agoCybercriminals Target Kodi Media Player for Malware Distribution
A recent cryptomining campaign shows criminal ingenuity....
an hour agoThe Link Between Volatility and Risk
Qadium's Matt Kraning on Lessons Learned From Review of Top Financial NetworksFinancial service organizations have networks that are larger and more dynamic than ever - and so are their network securi...
2 hours agoWhat Exactly is Threat Hunting - and Why Does it Matter?
Though there is debate over the various attributes that make up threat hunting, every SOC has the potential to engage in some level of hunting – and taking action is what’s truly important....
2 hours agoHow to Spot and Stop Newer Email Threats
Proofpoint's Denis Ryan on How Defenses Can Adapt to Latest AttacksEmail fraud threats have evolved from attackers targeting networks to them focusing on specific individuals within an organization. W...
2 hours agoU.S. General Service Administration Launches Bug Bounty Program
The United States General Service Administration’s (GSA) Technology Transformation Service (TTS) has launched a bug bounty program on HackerOne, the hacker-powered security platform announced on Frida...
3 hours agoNew Adwind Campaign Targets Linux, Windows, and macOS
Adwind remote access Trojan (RAT) samples detected in a recently campaign were configured to gain persistence on Linux, Windows, and macOS systems, Cisco Talos warns....

Threat Activity

Malicious IP addresses in the last 30 days

Top Countries

Last 30 days

    Top Categories

    Last 30 days

      Vulnerabilities

      The latest vulnerabilities publications

      Risk levels

      Last 30 days
      • 0 Critical
      • 3 High
      • 5 Moderate
      • 5 Low

      Top Vendors

      Last 30 days
      • 5 IBM
      • 4 Weseek
      • 1 Protonvpn
      • 1 Nordvpn

      Top Categories

      Last 30 days
      • 5 Cross-Site Scripting (XSS)
      • 2 OS Command Injections
      • 1 Information Leak / Disclosure
      • 1 Permissions, Privileges, and Access Control
      • 1 Deserialization of Untrusted Data
      • 1 Injection
      • 1 SQL Injection

      Authentication

      Last 30 days
      • 8 None
      • 5 Single
      • 0 Multiple

      Access Vector

      Last 30 days
      • 10 Network
      • 0 Adjacent Network
      • 3 Local