Funding/M&A
A Chinese firm has splashed out $6 billion for a US tech firm that distributes products for Apple and Microsoft, the latest eye-popping acquisition...
Hi, what are you looking for?
A Chinese firm has splashed out $6 billion for a US tech firm that distributes products for Apple and Microsoft, the latest eye-popping acquisition...
Ukrainian authorities reported over the weekend that a piece of malware had been discovered on the networks of the Boryspil international airport in Kiev.
A Russia-linked cyber espionage group has been using new tools in attacks against defense contractors and other high profile targets, Kaspersky Lab reported on...
Organizations tasked with investigating the crash of Malaysia Airlines Flight MH17 have been targeted by the Russia-linked threat group known as Pawn Storm, Trend...
Researchers have spotted a Nuclear exploit kit attack in which new Flash Player exploits are automatically generated throughout the day in an effort to...
Taiwan-based network attached storage (NAS) company Synology has released software updates to address several vulnerabilities reported by Dutch security company Securify.
Researchers at Dutch software security company Securify have identified a total of eight vulnerabilities in EMC M&R and EMC Secure Remote Services.
As cliché as the saying is, it is quite true that we live in a global world. It’s not uncommon for a large enterprise...
Malicious actors could theoretically shut down more than 5,300 gas stations in the United States because the automatic tank gauges (ATGs) used to monitor...
A security vulnerability identified on AliExpress, the wholesale marketplace owned by the Chinese e-commerce giant Alibaba, could have been exploited by hackers to hijack...
Researchers at FireEye have issued a report on an attack group targeting C-level executives to get insider information that could be used to gain...
In a broad agency announcement published last week, the Defense Advanced Research Projects Agency (DARPA) informed researchers that it is looking for innovative proposals...
As organizations worldwide become more and more aware of the risks posed by the lack of protection against cyber threats, information security spending will...
Technology mergers and acquisitions (M&A) soared by 57% year-over-year in the second quarter of 2014 and IT security has played an important role in...
It’s rare to hear about a startup that has been able to secure its Series A, B and C rounds while operating in stealth...
NIST to Develop Cybersecurity Testbed for ICSThe National Institute of Standards and Technology (NIST) is seeking information to build a reconfigurable cybersecurity testbed for...
Cybercriminals have developed a new Trojan largely based on Gameover Zeus in an effort to revive the botnet that was recently disrupted by international...
Mergers and acquisitions make for a busy time for businesses. Unfortunately for them, they can also be a busy time for attackers. According to...
In an effort to enhance its secure enterprise mobility offerings, Good Technology announced on Sunday that it has signed a definitive agreement to acquire...
Cybersecurity services firm KEYW Corporation (NASDAQ: KEYW) announced after the bell on Thursday that it would acquire Sensage, Inc., a Redwood City, California-based provider...