Latest Cyber Security News | Cyber Security Updates

Cyber Security

Bot Manager vs. WAF: Both are equally needed

Over 50% of web traffic is comprised of bots, and 89% of organizations have suffered attacks against web applications. Websites and mobile apps are...
Cybersecurity Solutions for business operations

Trend Micro providing a comprehensive suite of Cybersecurity Solutions to SREI Group

The threat defense platform provides centralized visibility, faster detection and response across their IT landscape  Trend Micro Incorporated is...
Radiflow Upgrades OT Cybersecurity Suite for NIS2 Compliance

Radiflow Upgrades OT Cybersecurity Suite for NIS2 Compliance

Radiflow, a leader in OT cybersecurity and risk management solutions and services, announced the release of its upgraded solution portfolio. The new...

NordVPN’s Bug Bounty Program offers cash rewards to ethical hackers

Following the promise to bring its security to the next level, NordVPN, one of the leading VPN service providers in the world, has officially...
NordVPN

A single bad password can compromise your accounts across platforms

Recent research has found that a staggering 60% of internet users reuse their passwords. However, what might seem a convenient solution to an ever-growing...
Supply Chain Attacks

Organizations Hit by Supply Chain Attacks, Struggle to Respond

The majority of global organizations (54%) suffered a software supply chain attack over the past year, and most are unable to keep...
SECORA ID security solutions

Infineon’s SECORA ID X drives introduction of contactless multi-application ID solutions based on JAVA...

Infineon Technologies AG extends its easy-to-integrate security solutions for contactless electronic ID documents. SECORA ID X is the company’s new flagship for...
Cybersecurity

Which departments are at the highest risk of being hacked? – Cybersecurity & Cyberattacks

Cybersecurity expert breaks down what makes certain departments more prone to cyberattacks than others With the human element being...
Automotive Cybersecurity

Automotive Cybersecurity Program with Proactive Protection

There are more connected cars in production and on the road than ever before, and these provide fertile ground for hackers to exploit potential...
Linux-based Cloud Environments

Trend Micro Detected Nearly 13 Million Malware Events Targeting Linux-based Cloud Environments

Coinminers, web shells and ransomware made up 56% of malwares targeting Linux systems in the first half of 2021

Interview