The Cybersecurity and Infrastructure Security Agency (CISA) in the U.S. issued security guidelines on how to mitigate cyber risks originating from anonymity networks like Tor. In collaboration with the FBI, CISA released an advisory explaining how attackers use Tor's...
A survey from the Global Association of Risk Professionals (GARP) revealed that risk managers across the world effectively handled the sudden transition to work-from-home amid COVID-19. According to the survey, 87% of risk professionals globally are working remotely compared...
Third-Party Risk Management (TPRM), commonly referred to as vendor or supply chain risk management, is not a new concept. It was originally founded with a more traditional on-premises IT mindset and was centered on an expectation of always having...
A survey from cybersecurity solutions provider Trend Micro revealed that nearly 72% of remote workers are more conscious about their organization’s cybersecurity and data handling policies since the lockdown began.
The survey “Head in the Clouds” stated that 85% of...
To address the concern over the rising number of devices at home being connected to the Internet, the European Telecommunications Standards Institute (ETSI) launched a new cybersecurity standard (ETSI EN 303 645) to establish a security baseline. From large...
Threat intelligence firm Group-IB discovered personal records of thousands of users from the U.K., the U.S., South Africa, Spain, Australia, Singapore, Malaysia, and other countries exposed in a multi-stage bitcoin scam. It is found that the attackers used 248,926...
Researchers from cybersecurity firm Lucy Security discovered a collection of two SQL databases exposed on darknet forums. It was found that the databases contain stolen information from 945 websites, hacked by different attackers from across the world. The databases...
As organizations consider moving to the cloud or architecting their applications in the cloud, security is top of mind. In the June 2020 cloud security survey, 68% of respondents stated that security, privacy, and compliance should be built in...
Threat actors are using sophisticated hacking methods to target users online. It’s not just about taking advantage of Coronavirus-related anxieties, but attackers are using every single opportunity to steal personal and financial information from users online. According to a...
IBM Security today announced the results of a global report examining businesses’ effectiveness in preparing for and responding to cyberattacks. While the organizations surveyed have slowly improved in their ability to plan for, detect and respond to cyberattacks over...













