Home Search

colonial pipeline - search results

If you're not happy with the results, please do another search
Apple Notarization, operational technology

How CISOs Can Communicate the Need for Both IT and OT Cybersecurity

0
When it comes to cybersecurity, 2021 was a wake-up call for most industrial sectors. Cyber vulnerabilities in operational technology (OT) were exposed and we...
Acronis Cyber Readiness Report, cyberattacks in India, cybercrime in India, India’s Private Sector

Cybersecurity is a Low Priority for India’s Private Sector

0
In the movie Die Hard 4.0, John McClane and a young hacker team up to thwart the plans of cyber-terrorist Thomas Gabriel in Washington...
bounty for DarkSide Ransomware Group, Microsoft Offers $100,000 Bounty

U.S. State Department Announces $10 Mn Bounty for Info on DarkSide Ransomware Group

0
The U.S. government is determined to eliminate the growing cyberattacks and cybercrime affiliates in the country. The U.S. Department of State recently announced a...
BlackMatter ransomware

BlackMatter Ransomware Group Shuts Shop Citing Pressures from Law Enforcement

0
BlackMatter cybercriminal group announced that it is shutting down operations, citing pressures from law enforcement authorities. Active since July 2021, BlackMatter offers ransomware-as-a-service (Raas),...
Shipping and Logistic companies

Login Credentials of Shipping and Logistics Firms Being Traded on Dark Web

0
Cybercriminals have extended their cyberattack targets ranging from supply chains to critical infrastructures. While some threat actors try to penetrate vital network systems and...
Ransomware Attacks, Graff ransomware attack

Russia-linked Conti Ransomware Gang Pillages Jewelry Brand Graff

0
Conti gang, in yet another attack, has targeted a well-known U.K.-based luxury jewelry brand Graff. As per reports, the hackers have pillaged the personal...
digital forensics, cyber forensics, forensics, digital identity

Why Businesses Should Be Invested in Digital Identity in 2021

0
Historically identity has been document-centric, requiring the physical presence of a user and a verifiable, government (or other authority)-issued document. However, as transactional interactions...
Cybersecurity Awareness Month

Cybersecurity Awareness Month 2021: Here’s What the Experts Have to Say

0
Like every year, CISA and the National Cyber Security Alliance (NCSA) are hosting the National Cybersecurity Awareness Month 2021 in the U.S. to raise...
zero-trust, Counter-Ransomware Meeting , Biden Administration and Tech Giants

White House Brings 30 Nations Together for Counter-Ransomware Event

0
As announced earlier, the Biden administration has initiated the virtual Counter-Ransomware Initiative meetings joined by ministers and senior officials from over 30 countries to address...
Google Cybersecurity Action Team Google, EU warns Google

Google Unveils Cybersecurity Action Team to Boost Cybersecurity

0
Search engine giant Google announced the formation of a  Cybersecurity Action Team to support the security and digital transformation of governments, critical infrastructure, private...

MOST POPULAR

RECENT POSTS

GITEX ASIA 2025

GITEX Europe 2025

GITEX AFRICA 2025

FUTURE AI SUMMIT MALAYSIA

CYBERX QATAR