Infosecurity News

Undervalued Assets Put Business at Risk

Undervalued Assets Put Business at Risk

A study finds IT security teams underestimating value of critical assets.

Request for Gift Card Purchases in Phishing Emails

Request for Gift Card Purchases in Phishing Emails

Holiday gift card spear phishing attack targets office managers.

Cisco Offers Cyber Training to UK Police Officers

Cisco Offers Cyber Training to UK Police Officers

Over 100,000 officers will gain access to Cisco Network Academy

NVRmini2 Network Video Recorder Vulnerabilities

NVRmini2 Network Video Recorder Vulnerabilities

Vulnerabilities enable hacking camera feeds and other restricted functions.

GCHQ Reveals Why Some Flaws Are Kept Secret

GCHQ Reveals Why Some Flaws Are Kept Secret

UK intelligence service stresses default position is to disclose

FCA: Cyber Resilience a Top Concern for Financial Firms

FCA: Cyber Resilience a Top Concern for Financial Firms

Employee risk and third-party visibility continues to be a challenge

Attackers Run on Dunkin's DD Perks Rewards

Attackers Run on Dunkin's DD Perks Rewards

Credential-stuffing attack targets rewards points from DD Perks account holders.

NSA Exploits Not Silent but Eternally Problematic

NSA Exploits Not Silent but Eternally Problematic

Researchers discover a new family of injections dubbed EternalSilence.

Attackers Keen on Automated Browsers

Attackers Keen on Automated Browsers

Since its release in 2017, Headless Chrome has grown popular among DevOps and attackers.

US Indicts Two Iranians for SamSam Campaign Blitz

US Indicts Two Iranians for SamSam Campaign Blitz

Three years of attacks caused $30m in losses for hospitals, cities and others

Elasticsearch Snafu Exposes Data on 82 Million Americans

Elasticsearch Snafu Exposes Data on 82 Million Americans

Personal info was left publicly accessible for at least two weeks

Dell Admits Potential Breach in Early November

Dell Admits Potential Breach in Early November

Attackers may have obtained names, emails and hashed passwords

What’s Hot on Infosecurity Magazine?