Skip to content
Trending
  • 3 Things to Do Today to Help Combat the Gender Gap in Cybersecurity

  • Akamai: Look for IoT devices to attack during Thanksgiving, Christmas

  • IoT security: Defending a young industry from attack

  • ROOT9B announces launch of cyber hunt certification for commercial sector

Cyber Security Minute

Cyber Security Minute

  • Featured
  • Security Blogs
  • Announcement Center
  • Contact
    Vulnerabilities

    Digital-first lifestyle opens consumers to potential risks during tax season

    Issued by: Help Net Security

    Vulnerabilities

    Intel Paid Out $800,000 Per Year Through Bug Bounty Program

    Issued by: Security Week

    Vulnerabilities

    Universal Health Services Suffered $67 Million Loss Due to Ransomware Attack

    Issued by: Dark Reading

    Malware & Threats

    New ‘LazyScripter’ Hacking Group Targets Airlines

    Issued by: Security Week

    Software Security

    What Can Your Connected Car Reveal About You?

    Issued by: Dark Reading

    Malware & Threats

    Attackers Already Targeting Apple’s M1 Chip with Custom Malware

    Issued by: Dark Reading

Announcement Center

Featured Security Blog Posts

Data loss prevention strategies for long-term remote teams

February 5, 2021 9:07 am

Advertisement Before the recent pandemic, many executives began appreciating the risks and opportunities associated with cybersecurity. A 2019 survey on cybersecurity priorities from Optiv Security found that 96% of CISOs are taking “a more strategic approach to cybersecurity,” and many were even willing to slow business development to account for cybersecurity-related risks. This was great...

The state of the dark web: Insights from the underground

January 21, 2021 10:56 am

Advertisement Lately, dark web actors have one more worry: getting caught by law enforcement. Tracking dark web illegal activities has been a cat-and-mouse game for authorities, but in the end, they often catch their adversaries and seize the dodgy money. On the night of the 2020 presidential election, for example, US government officials managed to...

The future history of medical device cybersecurity

January 13, 2021 8:12 am

Advertisement In 1555, Nostradamus published his famous Les Prophéties containing obfuscated prophecies for the world to come. Some believe that one of these predictions pertains to the year 2020 and it reads, in part: “The false trumpet concealing madness / will cause Byzantium to change its laws.” Yeah… I have no idea what that means...

Security Blogs

Tufin releases Vulnerability-Based Change Automation App

Issued by: Help Net Security

Tufin released the Vulnerability-Based Change Automation App (VCA). The new app expands Tufin’s vulnerability management capabilities with automated vulnerability checks prior to approving network access changes. When combined with the Vulnerability Mitigation App (VMA), Tufin delivers a vulnerability management solution that allows customers to maintain...
Continue reading

Digital-first lifestyle opens consumers to potential risks during tax season

Issued by: Help Net Security

Consumers have faced a lot of change over the past year with the shift to a digital-first lifestyle, and tax season with increasing risks is no exception. McAfee’s 2021 Consumer Security Mindset study revealed that while roughly 2 out of 3 Americans (63%) plan to...
Continue reading

Number of ransomware attacks grew by more than 150%

Issued by: Help Net Security

By the end of 2020, the ransomware market, fueled by the pandemic turbulence, had turned into the biggest cybercrime money artery. Based on the analysis of more than 500 attacks observed during Group-IB’s own incident response engagements and cyber threat intelligence activity, researchers estimate that...
Continue reading

Money for nothing: Making sense of data collaborations in healthcare

Issued by: CIO Security

Several leading health systems got together recently to announce the formation of Truveta, an independent company that will pool patient medical records from the participating health systems and analyze them for insights to drive healthcare outcomes. The announcement highlighted the benefits of sharing de-identified data...
Continue reading

Thousands of Mobile Apps Expose Data via Misconfigured Cloud Containers

Issued by: Security Week

The issue, the company notes, is rooted in the fact that many developers tend to overlook the security of cloud containers during the development process. Cloud services help resolve the issue of storage space on mobile devices, and developers have numerous such solutions to choose...
Continue reading

Microsoft Adopted an ‘Aggressive’ Strategy for Sharing SolarWinds Attack Intel

Issued by: Dark Reading

In the wake of a widespread cyberattack, enterprise IT providers can play a key role in how businesses learn about and mitigate the security threat. That role has evolved as attacks grow more complex - and it presents a tricky challenge when a provider must...
Continue reading
Advertisement

Recent Posts

  • Tufin releases Vulnerability-Based Change Automation App

  • Digital-first lifestyle opens consumers to potential risks during tax season

  • Number of ransomware attacks grew by more than 150%

  • Money for nothing: Making sense of data collaborations in healthcare

Security Blogs Categories

  • Application Security
  • Cloud Security
  • Malware & Threats
  • Mobile Security
  • Network Security
  • Software Security
  • Vulnerabilities

Security Blogs Archive

  • March 2021 (18)
  • February 2021 (43)
  • January 2021 (43)
  • December 2020 (47)
  • November 2020 (43)
  • October 2020 (43)
  • September 2020 (44)
  • August 2020 (37)
  • July 2020 (46)
  • June 2020 (39)
  • May 2020 (35)
  • April 2020 (37)
  • March 2020 (34)
  • February 2020 (39)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (29)
  • October 2019 (34)
  • September 2019 (32)
  • August 2019 (24)
  • July 2019 (32)
  • June 2019 (32)
  • May 2019 (39)
  • April 2019 (24)
  • March 2019 (30)
  • February 2019 (30)
  • January 2019 (28)
  • December 2018 (16)
  • November 2018 (29)
  • October 2018 (25)
  • September 2018 (31)
  • August 2018 (36)
  • July 2018 (24)
  • June 2018 (33)
  • May 2018 (35)
  • April 2018 (31)
  • March 2018 (42)
  • February 2018 (39)
  • January 2018 (31)
  • December 2017 (30)
  • November 2017 (37)
  • October 2017 (48)
  • September 2017 (50)
  • August 2017 (45)
  • July 2017 (46)
  • June 2017 (46)
  • May 2017 (46)
  • April 2017 (46)
  • March 2017 (74)
  • February 2017 (59)
  • January 2017 (61)
  • December 2016 (84)
  • November 2016 (101)
  • October 2016 (66)
  • September 2016 (1)
  • July 2016 (1)
  • June 2016 (3)
  • May 2016 (4)
  • April 2016 (1)

About Us

Cyber Security Minute delivers constantly updated press releases and blog posts covering today's cyber-security issues.

Whether you're looking for updates on the latest cyber threats, or for new solutions to protect your business, our editorial team will keep you informed with a fresh stream of news
Copyright © . All rights reserved | Privacy Policy
Back to top