A new research from consumer credit reporting agency TransUnion revealed that phishing is the top digital fraud across the globe related to the COVID-19 pandemic. In its research report “Consumer Financial Hardship Studies” TransUnion stated that 27% of consumers...
Every year, cybercriminals steal approximately $40 billion from older adults (senior citizens aged 60 and over) in the U.S. Cybercrime can be defined as “any criminal activity in which a computer (or networked device) is targeted and/or used.” Cybercriminals...
Networking and hardware company Cisco stated that it has become aware of the availability of public exploit code and active exploitation of a high-severity vulnerability in its web services interface, Adaptive Security Appliance (ASA) and the Firepower Threat Defense...
Dave, a digital banking and overdraft protection service provider, confirmed that a data breach incident compromised 7,516,625 of its user details. The leaked data includes personally identifiable information (PII) like names, email IDs, birth dates, physical addresses, and phone...
A survey from cybersecurity firm SonicWall revealed that the opportunistic use of COVID-19 pandemic by cybercriminals has resulted in the rise of ransomware and IoT malware attacks globally. The survey “2020 SonicWall Cyber Threat Report” found that ransomware continues...
Mumbai, India – July 27, 2020 – Following the huge success of CISO MAG Awards India 2019, EC Council’s CISO MAG is all set to virtually host the 2nd Edition of the CISO MAG Awards and Summit India on July 30, 2020 from 9:55 AM to 15:00 PM...
Security researchers from Trustwave revealed that certain models of ASUS routers are vulnerable to malicious attacks. The bugs in the routers are related to its firmware update process. In a security advisory, the researchers stated that they found security vulnerabilities...
Much is said about the importance of security testing, regardless of what we call them, be it Pentest, Ethical Hacking, Red Team or whatever. This is a process that all security teams must have and perform regularly, if not...
As cybersecurity challenges become more complex, the tendency is for organizations to focus on what piece of security technology they can acquire next. But that usually means the human component of the security operations center (SOC) isn’t getting enough...
Cybersecurity solutions provider AttackIQ announced a strategic partnership with managed detection and response services firm Ackcent to provide breach and attack simulation (BAS) and continuous security validation (CSV) to customers across Europe. Industry experts opined that the partnership allows...














