CISO MAG EDITORIAL
Not long ago, the IT Head---and we are using this as a generic term--of an organization was concerned with securing all the infrastructure behind the company firewall. In those days, threats were largely viruses, trojans and worms....
November 21, 2019: Today, the typical organization has hundreds if not thousands of endpoints: desktops, workstations, laptops, mobile phones, tablets, access points, printers, IP-cams, USB devices, credit card readers, POS devices, servers, cloud VMs, and virtual desktops. The addition...
In order to increase voters' confidence in political ads, Google recently announced that it is making a few changes in handling political ads on its platform globally.
The updated ad policy will come into effect within a week in the...
Trend Micro Incorporated today announced its 2020 predictions report, which states that organizations will face a growing risk from their cloud and the supply chain. According to Trend Micro's 2020 predictions, the growing popularity of cloud and DevOps environments...
Microsoft has declined rumors about its communication platform Teams being used by cybercriminals to install ransomware on company networks.
The speculations from unknown sources are circulating online in early November after many companies in Spain affected by the “DoppelPaymer” ransomware.
Besides...
Mozilla recently announced that it has doubled the rewards for its bug bounty program to draw more eyeballs from the bug-hunting community. The web browser developer also stated that it has added new sites and services to the list...
In July this year, researchers discovered a critical Docker copy command vulnerability that gave attackers complete root control of the host and its associated containers. This copy (cp) command is used to copy files and folders to and from...
Security researchers discovered the existence of vulnerabilities in Google and Samsung smartphones which allow attackers to exploit phone cameras.
The flaw, which primarily stems from permission bypass issues, could allow attackers to secretly take photos, record videos, eavesdrop on conversations,...
By Sunil Chandna, Co-Founder and CEO, Stellar
Data is growing at an incredible pace and this trend is expected to go steeper in the coming years. As per a recently published industry study, 2.5 quintillion bytes of data are created...
Beware! The Mispadu Trojan is collecting victim’s payment-card and online banking details by malvertising as McDonalds free meal coupon ads.
Mispadu is a banking trojan that according to the research team at ESET, is specifically targeting the Latin American countries...














