Home Authors Posts by CISOMAG

CISOMAG

3853 POSTS 0 COMMENTS

These are the 3 Ps for Thwarting BEC Attacks

0
Business email compromise (BEC) is a prevalent email threat to organizations and a lucrative business for hackers. BEC attacks have increased and become more...

Millions of IoT Devices Using ‘ThroughTek Kalay Network’ Vulnerable to Eavesdropping

0
The rising security breaches and vulnerability exploits on the Internet of Things (IoT) indicate that connected devices are never 100% secure. Security researchers from...

“Privacy Enhancing Technologies can allow organizations to pursue data sharing while...

0
If we were to participate in a Socrates seminar and deliberate on the importance of securing data, in unison, the response would be: Encryption,...

Secret Terrorist Watchlist with 1.9 Mn Records Exposed Online

0
Sometimes, misconfigured servers and unsecured databases go unnoticed until security researchers report about them. Bob Diachenko, Head of Security Research at Comparitech, recently discovered...

T-Mobile Investigates Illegal Security Intrusion

0
It seems like the famous American telco T-Mobile is cursed to suffer constant security incidents. After sustaining a data breach in February 2021, T-Mobile recently...

How to Know When it’s Time to Break Up with Your...

0
Even if your organization doesn’t want to address it, there comes a time when every company needs to take a step back, take stock...

Everything You Need to Know About the Evolution of Cyberthreats

0
The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An...

Mr. White Hat Controls Poly Network’s User Assets for Fun!

0
Reported as the largest Decentralized Finance (DeFi) Platform hack, Poly Network is the most recent addition to the high value list of victims of...

FireEye Mandiant to Provide Cyber Defense to Alpine F1 Team

0
If the pandemic had played a spoilt sport for ardent Grand Prix fans and deprived them of the adrenaline rush, “The Hungarian Grand Prix...

Threat Actors Turning to RDDoS Attacks as a New Ransom Vector

0
While ransomware attacks are taking the corporate world by storm, a latest analysis revealed that over 44% of businesses sustained a ransom distributed denial...

MOST POPULAR

RECENT POSTS