Suspected Owner of BreachForums Data Breach Website Arrested in the US
Read also: Major crypto ATM manufacturer hacked, a phone scam gang that prayed on elderly Americans dismantled, and more.
Read also: Major crypto ATM manufacturer hacked, a phone scam gang that prayed on elderly Americans dismantled, and more.
A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24.
The blockchain industry is expected to grow and hit a value of $163 billion by 2029. With such growth will also come the ever-increasing need for ensuring the protection of blockchain applications. In comes blockchain auditing companies.
Cybersecurity is often about making progress: Progress in the way organizations procure, deploy and manage software; in the new skills and techniques teams acquire to run their cybersecurity programs; and in stopping breaches to protect hard-earned productivity gains.
According to the AV-TEST Institute, more than 1 billion strains of malware have been created, and more than 500,00 new pieces of malware are detected every day. One of the main reasons for this rapid growth is that malware creators frequently reuse source code. They modify existing malware to meet the specific objectives of an attack campaign or to avoid signature-based detection.
Recently, Gartner® refreshed one of its foundational cybersecurity research, “The 6 Principles of Successful Network Segmentation Strategies.”1 The principles covered in the research are tried and true. Segmenting networks to improve security and performance is nothing new to security teams, yet the same challenges persist year after year.