CyberSecurity


Toyota and Lexus Dealerships Hacked, Millions Left Vulnerable

Toyota and Lexus Dealerships Hacked, Millions Left Vulnerable

Toyota's servers in Japan have been hacked, leaving millions of pieces of data left vulnerable.



Automation Can Close the Gap on Cyber Exposures

Automation Can Close the Gap on Cyber Exposures

See no evil, hear no evil, speak no evil: It is tempting for physical security professionals to take this passive approach to cybersecurity.

An Iron Solution

An Iron Solution

One of the primary criteria for any surveillance, access or security system is the requirement for a consistent and reliable power source, as even the most complex and expensive system solutions will be rendered useless if power is interrupted.

Managed Firewall Services

Managed Firewall Services

As cybercrime continues to plague companies of all sizes, across all industries both public and private, we wanted to take this opportunity to explore options that can help protect your data and your business.

Data Breach Exposes Data of Thousands of Medical Marijuana Patients

Data Breach Exposes Data of Thousands of Medical Marijuana Patients

The breach exposed diagnostic results, healthcare numbers and personal contact information.

Change Your Facebook Password Now

Change Your Facebook Password Now

Everyone should be changing their Facebook passwords after it was discovered all use passwords have been left unencrypted and searchable in plaintext.

2FA Immune Phishing Attacks Are on the Rise

2FA Immune Phishing Attacks Are on the Rise

2FA is more secure than single-factor methods only requiring a password, but it's not an impenetrable method.

How to Troubleshoot a DNS Leak

How to Troubleshoot a DNS Leak

DNS leaks can be a surprisingly common issue and are often only noticed when actively looked for.

Facebook Stored Hundreds of Millions of Passwords Unencrypted

Facebook Stored Hundreds of Millions of Passwords Unencrypted

Facebook stored “hundreds of millions” of account passwords unencrypted and viewable as plain text to tens of thousands of company employees, KrebsonSecurity reported Thursday.

Insider Threats: How to Stop the Most Common and Damaging Security Risk You Face

Insider Threats: How to Stop the Most Common and Damaging Security Risk You Face

Since each insider threat is very different, preventing them is challenging.

Being Unprepared is Not an Option

Being Unprepared is Not an Option

What does the future hold for audit and compliance?

Equifax Tells Canadians to do More to Protect their Data

Equifax Tells Canadians to do More to Protect their Data

Despite their new image as a failed cybersecurity company, Equifax is warning Canadians to do more to protect their data.

Security Staff Are Adopting Biometrics But Can Do More to Eliminate the Password

Security Staff Are Adopting Biometrics But Can Do More to Eliminate the Password

A survey found that security professionals are making the move to biometrics, but that they could be doing more to protect data.

Congress Introduces Bill to Improve IoT Security

Congress Introduces Bill to Improve IoT Security

The Internet of Things Cybersecurity Improvement Act aims to establish a bare minimum of security standards for IoT devices used by the federal government

Three Million Vehicles Vulnerable After Security Flaw Found in Car Alarms

Three Million Vehicles Vulnerable After Security Flaw Found in Car Alarms

Vulnerabilities found in two different car alarms left three million vehicles susceptible to hijack globally.

New System Uses Machine Learning to Scan Tweets for Security Flaws

New System Uses Machine Learning to Scan Tweets for Security Flaws

Machine learning and Twitter could be the future of catching security flaws and vulnerabilities early.

Facebook Announces Plans to Pivot toward Privacy

Facebook Announces Plans to Pivot toward Privacy

“I believe the future of communication will increasingly shift to private, encrypted services where people can be confident what they say to each other stays secure and their messages and content won't stick around forever. This is the future I hope we will help bring about,” Zuckerberg wrote.

Google Chrome Vulnerability: Here

Google Chrome Vulnerability: Here's How to Fix It

Google has discovered a Zero-Day Vulnerability [CVE-2019-5786] that is being exploited by bad actors. If you are a Chrome user, you are at risk. Make sure your browser has been updated to the latest patched version [72.0.3626.121], which fixes the vulnerability.

Chinese Hackers Reportedly Targeted 27 Universities

Chinese Hackers Reportedly Targeted 27 Universities

The cyberattacks focused on universities that either studied underwater technology or had faculty with relevant backgrounds, according to reports.

Verizon Report Explores the World of Insider Threats

Verizon Report Explores the World of Insider Threats

Verizon takes its Data Breach Investigations Report and refocuses on Insider Threat reports.

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities