Kaspersky Lab experts have discovered a backdoor planted in a server management software product used by hundreds of large businesses around the world.
Former Cisco executive Gaurav Agarwal is the new India leader at Symantec, post Shrikant Shitole's exit.
We review some of the most innovative and useful security tools from today's most important cybersecurity technology categories.
The business impact of security incidents and evolving regulations are driving market growth, according to Gartner.
Amazon Macie will continuously monitor data access for unusual activity and will trigger alerts to a customer’s security team in case of anomalies.
Fancy Bear, a Russian government-sponsored cyber-espionage group, has been accused of using a leaked NSA hacking tool in attacks against hotels in order to spy on guests.
USB hubs found to leak information to external devices thanks to a kind of electronic "crosstalk" between connected components.
The Cloud App Security subscription service will boot users off the network, and out of apps and services, at the first sign of anomalous behavior.
Former IBM executive Mandar Patil to lead India and SAARC ops for the cybersecurity startup’s deception technology solutions.
Over 20 eminent speakers from Infosys, Wipro Technologies, Essar Group, IDC and others will discuss cyber threats and solutions in a rapidly evolving digital landscape.
Fortinet’s FortiCloud 3.2 update enables full management of FortiGate devices to centralize security operations.
A survey of 250 self-identified hackers at the twentieth annual Black Hat conference has revealed the security technologies they find toughest to beat.
Commonwealth Bank of Australia has blamed a software coding error for the anti-money laundering and counter-terrorism financing law breaches it has been accused of by AUSTRAC.
TunnelBear's third-party security audit helped the VPN service fix vulnerabilities and prove its seriousness about protecting its customers.
Bad actors using typo-squatting place 39 malicious packages in npm that went undetected for two weeks. How should the open source community respond?
The British government has confirmed that it intends to mirror the upcoming General Data Protection Regulation (GDPR) with a new Data Protection Bill
This agreement aims to combat criminal trends in cyberspace and cybercrime globally through sharing threat information generated by Palo Alto Networks and Unit 42, its threat intelligence team.
The longest DDoS attack in Q2 was active for more than 11 days, a 131 percent increase compared to Q1 2017.
A bill submitted this week to the U.S. Senate could be the first step toward fixing IoT security.