Security researchers from Trend Micro revealed that threat actors compromised government websites of eight U.S. cities across three states through Magecart card skimming attack. The attack occurs when users make a payment on the compromised Click2Gov website.
“These sites all...
Security experts from Palo Alto Networks discovered a new malware dubbed “Lucifer” targeting Windows systems with cryptojacking and distributed denial-of-service (DDoS) attacks. The researchers stated that Lucifer is a new kind of self-propagating malware that tries to exploit unpatched...
CISO MAG recently hosted a Virtual Roundtable with Ajay Kumar, Director, Solutions Engineering of BeyondTrust, and Sean Gunasekera, ASEAN Cyber Security Lead, EY. The roundtable, which was moderated by Brian Pereira, Principal Editor, CISO MAG, was on the subject...
The pandemic and subsequent remote working resulted in businesses making sudden and intermittent changes to infrastructure. This is a risky proposition since security policies were often bypassed, and tools and technologies used by remote workers (shadow IT) are not...
The U.S. Department of Justice (DoJ) has charged the founder of WikiLeaks, Julian Assange, with a fresh indictment superseding the previous one on counts of planned conspiracy in compromising classified military and government information. The new indictment does not...
The U.K’s privacy watchdog, National Cyber Security Centre (NCSC), received one million phishing email reports in two months, with an average of 16,500 email reports a day. In addition, the NCSC reported that it blocked around 10,000 malicious URLs...
A new report from cybersecurity firm ClearSky revealed that a hacking group “CryptoCore” is targeting cryptocurrency exchanges via spear-phishing campaigns. CryptoCore, also known as Dangerous Password and Leery Turtle, stole cryptocurrency worth $200 million in two years. It is...
Telegram, a cloud-based messaging app, suffered a data breach after unknown hackers exposed personal details of its users on darknet forums, according to a report from Russian publication Kod.ru. The exposed database contains phone numbers, unique Telegram user IDs,...
In the recent CISO Mag Cloud Security Survey – June 2020, one of the questions posed to respondents was “What are some of the biggest security concerns raised when you choose a cloud service provider (CSP)?” A notable finding...
The tensions between India and China are escalating by the day over the border dispute between the two nations in the Ladakh region. However, a series of no-arms combat peace treaties signed in 1993, 1996 and 2005 for maintaining...














