Home Blog Page 133
While 5G technology is taking the world by storm with its incredible high speeds and low latency, several organizations have their own set of concerns around the cybersecurity risks related to 5G adoption. A new poll by Deloitte indicates...
The FBI issued a warning about online scammers targeting unemployed youth in the U.S. by recruiting them into their cybercriminal activities. Various threat actor groups are using unwitting users in various money mule schemes to launder their illegal funds. According...
The U.S. District Court in Seattle, on December 1, 2020, sentenced 21-year-old Ryan S. Hernandez aka Ryan West, to three years of imprisonment. The court found Hernandez guilty on two separate counts: one that involved a computer hacking scheme...
A survey from the Nationwide Agent Authority, a provider of diversified insurance and financial services, revealed that nearly 50% of cyberattacks are aimed at small businesses, but only 37% of small business owners reported believing they are at risk...
To strengthen cybersecurity practices and boost partnerships in cyberspace, the U.S. and Australia have signed “The Cyber Training Capabilities Project Arrangement,” which allows both nations to jointly develop a virtual cyber training program. The bi-lateral agreement enables the U.S....
Verizon Communications, an American telecommunications company, has been found exposing customers’ personal data for months due to a technical glitch in its chatbox on the company’s website. As reported by Ars Technica, the vulnerability is making the chat window...
Commencing today (December 7, 2020), XR Safety Initiative (XRSI), a not-for-profit Standards Developing Organization (SDO), has launched the first annual XR Safety Awareness Week to celebrate XR with a focus on issues like child safety, diversity & inclusion, medical...
Popular staffing company Randstad has suffered a ransomware attack in which threat actors stole unencrypted files from its network. In an official release, the HR agency stated that the Egregor ransomware group illicitly obtained access to the company’s global...
Security Operations (SecOps) team members have interesting stories to tell about their run-ins with cyber adversaries. Some of these professionals have built and run Security Operations Centers (SOCs) for some of the world’s largest companies. They’ve seen daily incidents...
The digital transformation of health care is driving the adoption of new technology and information systems to support key business and clinical initiatives. We are experiencing a veritable explosion in health care data, systems, and devices. Health care data...