Home Blog Page 45
Ever since cybercriminal activities surged globally, the U.S. government initiated multiple cybersecurity measures to enhance security and defend against cyberattacks. Deputy Attorney General Lisa O. Monaco recently announced the launch of the Civil Cyber-Fraud Initiative, which will combine the...
The increase in remote workforce encouraged several organizations across the globe to embrace the Bring Your Own Devices (BYODs) concept. However, using personal devices for official work also brought in various kinds of data security and privacy risks, as...
For organizations of all sizes across the globe, 2020 and 2021 were undoubtedly unprecedented years in many ways. Companies were forced to adopt remote workforce, digitalizing all operations. Notably, the rise of cybercriminal activities leveraging the pandemic made organizations...
A torrent link to a 125GB file with source code and business data of the video streaming platform Twitch has been leaked and published on the 4chan discussion board. An unknown hacker, who premeditated the attack, permeated the streaming platform...
With the volume of attacks on enterprises increasing by the day, it is no longer sufficient to do occasional or manual penetration testing. Organizations usually test “some” of their assets “some of the time,” whereas hackers are attacking “all...
As the world celebrates Cybersecurity Awareness Month, Google announced new security precautions to make users’ sign-in process more secure. The search engine unveiled its plan to auto-enroll 150 million Google users in a two-step verification (2SV) process and it...
The attack vector of Russian state-sponsored advanced persistent threat (APT) attackers is extended across various countries. Multiple cybercriminal groups from Russia have targeted several international critical agencies across the globe. But surprisingly, security researchers from Positive Technologies uncovered a...
The spread of mobile malware has become rampant in the cyberthreat landscape. More threat actor groups are leveraging mobile malware to infect handsets and to compromise personal data. Security researchers from Proofpoint recently uncovered a new mobile malware, distributed via SMS, targeting Android users in...
Social media platforms are ingrained into the lives of billions of people across the globe and the unavailability of any one of them brings their life to a grinding halt. This is what billions of users of Facebook and...
While IT leaders believe they have strong security practices in place, their continual search for additional network security capabilities suggests that this confidence may be tentative, according to new research from Forward Networks, a provider of network assurance and...