On March 15, 2021, AMD launched its latest EPYC (Extreme Performance Yield Computing) 7003 Series processors – “Milan” – intending to improve the speed, agility, and core performance of its EPYC processors for faster business outcomes. Correspondingly, AMD also...
Most organizations and security agencies publish and share Portable Document Format (PDF) files without proper sanitization, leaving them open to data theft. Cybersecurity experts suggest that most users and businesses are unaware that cybercriminals often target these kinds of...
Security experts found a threat actor from a hacking forum selling stolen databases that contain sensitive data of more than 24,000 customers from a banned online platform WeLeakInfo.com. Cybercriminals used to leverage the WeLeakInfo.com platform for trading stolen information...
The story dates to 1941, when mysterious letters appeared in the mailboxes of a few select students at Seven Sister colleges, seven liberal arts colleges in the Northeastern United States that are historically women's colleges. These were students who...
At a time when everyone is more connected than ever, cybercriminals too have become more active looking for ways to turn an adverse situation to their advantage. Since the beginning of the pandemic, threat actors have been leveraging innovative...
The widespread use of video streaming services in the market made password sharing with friends and family a common practice. However, security experts suggest that this practice increases the chances of accounts getting hacked, further leading to the theft of...
A Utah-based COVID-19 testing service, Premier Diagnostics, accidentally exposed the personally identifiable information (PII) belonging to 50,000 patients through an unsecured server. The exposé was done by Comparitech’s lead researcher Bob Diachenko, who discovered the unsecured database of Premier...
Security experts uncovered a new kind of phishing campaign in which threat actors are using newly crafted malware written in a rare programming language to evade security detection. Researchers from Proofpoint found a cybercriminal group tracked as “TA800” distributing...
International Women’s Day is a time to reflect on the progress we’ve made to encourage women in all environments. It is also a day to celebrate all the men who have mentored and supported their female counterparts. And though...
As the world celebrated womanhood and women’s contribution to society on International Women’s Day, we at CISO MAG decided to devote the month of March to all the women leaders of cybersecurity. This was in the light of the...














