Home Blog Page 208
Natura, a provider of personal care and beauty products, suffered a data breach which compromised the personal information of more than 250,000 customers. The Brazilian cosmetics firm unknowingly leaked the personal information of customers who had ordered products from...
EasyJet admitted that it has been a target of a cyberattack from a highly sophisticated source.  It first learned of the attack in January 2020. The European airline stated that the threat actors accessed the email addresses and travel...
The unprecedented rise of cloud technologies, and the emergence of the Internet of Things (IoT) and Software Defined Networks (SDN) have accelerated the digitization of businesses. The very fabric of traditional business methodologies has been transformed by advanced data-driven...
Working from home may make sense to reduce your employee’s risk of contracting COVID-19. It does, however, make life more difficult for your security team. At the office, you have complete control over the network’s cybersecurity. At home, employees...
Seqrite, an enterprise arm of security firm Quick Heal Technologies, detected a new wave of Adwind Java Remote Access Trojan (RAT) campaign targeting Indian co-operative banks by taking advantage of COVID-19 pandemic. Seqrite warned that attackers were trying to take...
Researchers Aleksandar Nikolic and Cory Duplantis from Cisco Talos discovered multiple vulnerabilities including two code execution flaws and one information disclosure flaw in Nitro Pro PDF reader. Cisco Talos reported the said vulnerabilities in accordance with their disclosure policy...
Financial gain remains the key motivator for cybercrimes with nine in 10 (86%) data breaches that were investigated and proved to be financially driven, according to the Verizon’s 2020 Data Breach Investigations Report. The research revealed that credential theft and...
Academic researchers at the École Polytechnique Fédérale de Lausanne (EPFL), a research institute and university in Lausanne Switzerland, discovered a new vulnerability in the Bluetooth wireless protocol, which is used to interconnect modern devices like smartphones, laptops, IoT devices,...
Security researcher Troy Hunt discovered an open Elasticsearch database containing around 22 million of email records. The researcher has said that he has not been able to trace source of the database. In February, Troy Hunt reported about an open...
CISO MAG hosted its third Fireside Chat series with Thomas Tschersich, Chief Security Officer (CSO) Deutsche Telekom for a slew of cybersecurity experts comprising of CISOs, CEOs, CIOs and several other senior leaders and executives from U.S., UK, Germany,...