Home Blog Page 164
More than 100 computer systems of the National Informatics Centre (NIC) in India were compromised in a suspected malware attack. The NIC is part of the Ministry of Electronics and Information Technology (MeitY) and responsible for securing critical cyber...
The 2020 U.S. election is just a couple of months away and opportune threat actors are bound to make attempts of attacking the accounts of high-profile personalities for malicious gains. To avoid this nuisance, Twitter has come forward and...
Health care providers have been the primary targets of cyberattacks, with several data breaches and ransomware attacks making headlines in the last few years. Health care organizations have suffered the highest number of cyberattacks than any other sector in...
The proliferation of the Internet of Things (IoT) devices in consumer, enterprise, and health care organizations, and their internal vulnerabilities has created a security blind spot for cybercriminals. They can launch a Zero-day attack to compromise devices like webcams,...
Egress, a provider of human layer data security solutions, stated that several organizations suffered data breach incidents due to outbound email errors in the last year.  In its research report, “2020 Outbound Email Data Breach,” Egress revealed that 93%...
Today’s exponential industrial internet of things (IIoT) growth creates a crucial need for robust cybersecurity practices and well-defined standards that provide customers with confidence that their connected devices will operate securely throughout their entire lifecycle. By Max Wandera, Director, Product Cybersecurity...
Chinese firm Zhenhua Data Information Technology has been accused of collecting data on millions of people worldwide. The Chinese tech company has reported links with the country’s military and intelligence networks, and thus, this action could be an act...
A research report from CrowdStrike Inc., the developer of cloud-delivered endpoint protection solutions, revealed that eCrime activities and other malicious actions of state-sponsored actors have increased during the first half of 2020. The “2020 Threat Hunting Report: Insights from...
The U.K.’s National Cyber Security Centre (NCSC) released a new “Vulnerability Reporting Toolkit,” which is intended to help organizations manage their vulnerability disclosure processes in a simplified manner. The Toolkit is helpful for all types of organizations that are...
Australia has been a hotbed for cyberattacks and the country’s Prime Minister, Scott Morrison, has been very vocal about it. Owing to the surge in cyberattacks, especially targeted towards the country’s critical infrastructure, Morrison recently allocated AU$1.66 billion (approximately...