Security News
Malicious actors are targeting critical infrastructure (CNI) sites and energy distribution facilities exponentially. Interconnected systems in the energy industry increase vulnerabilities, and...
Almost three quarters of the 650+ international IT professionals Gurucul canvassed said they are vulnerable to insider threats, and ranked user error (39%) and malicious insiders (35%) ahead of...
The NCAA Tournament ended just a few days ago and the pain or exuberance, depending on your bracket picks, is still fresh. As I watched hours of college basketball, I was struck by something the...
A large portion of the infrastructure related to a Middle Eastern threat actor known as Gaza Cybergang was taken down after their latest operations were uncovered, Kaspersky Lab’s security...
i3 Operations (i3 Ops) Artificial Intelligence Maintaining Safety (AIMS), an AI platform that unravels the chaos of social media in real time to identify threats has emerged from stealth mode. i3...
The 5G race is on as carriers prepare for the onset of the next wireless generation in their own ways. While some have pseudo-definitions of 5G, others like Verizon and AT&T, are leading the 5G...
The challenge for most enterprises is that the demand for software is so high that traditional development teams often can’t keep up.
Flowershop, Equation, Flame and Duqu appear to have a hand in the different phases of Stuxnet development, all working as part of an operation active as early as 2006.
Manufacturing networks still running outdated technology could risk their intellectual property and production processes. The Trend Micro report, Securing Smart Factories: Threats to Manufacturing...
The latest edition of the ISMG Security Report offers an in-depth look at the ever-changing ransomware threat. Other topics: filling the DevSecOps skills gap and the repercussions of Australia's...