Home Search

phishing - search results

If you're not happy with the results, please do another search
Ransomware attacks, ransomware, Sinclair Broadcast group

HMC says ransomware attack turned into a data breach

0
Health Management Concepts (HMC) recently experienced a ransomware attack that quickly turned into a major data breach that compromised the patient’s personal data like...
George Garofano Sentence

Fourth person sentenced to prison for the 2014 celebrity iCloud hack

0
The fourth and the final person involved in the 2014 iCloud hack has been sentenced to eight months of prison. Connecticut resident George Garofano...
credential phishing campaigns

Convincing organizations to say “Yes to InfoSec”

0
Contributed by Cloud Security Alliance By Jon-Michael C. Brook, Principal, Guide Holdings, LLC Security departments have their hands full. The first half of my career was government-centric, and...
House of Representatives

Candidates for U.S. House of Representatives vulnerable to security threats: Researchers

0
Researchers stated that the websites of the candidates running for the House of Representatives elections in November are vulnerable to hacking. A team of four...

UnityPoint Health suffers breach; 1.4 million patient records compromised

0
Lowa-based health system UnityPoint Health has fallen victim to a recent data heist that compromised 1.4 million patient records. According to an official statement...
Insider threat

Six massive insider breaches in the last five years

0
By Rudra Srinivas Insider threat is a primary concern for every information security leader. Several organizations are seen spending massive resources to keep the bad...
Human Resources

The missing link to finding insider threats: Human Resources

0
Contributed by Renee Small According to the Ponemon Institute’s 2017 Cost of Data Breach study, 47% of the organizations represented stated that the root cause...
Power Plant cybersecurity

Power Plants: Cybersecurity Threats and Risks

0
Contributed By Glenn Hartfiel, Director, Opportune’s Process and Technology Practice Power plant networks are under constant attack from Chinese, Russian and other unknown hackers across the...
BYODs

Most feds bring own devices to work without agency approval: Report

0
Government Business Council, a research arm of Nextgov, conducted a survey of 165 government employees working in the United States federal and military agencies...
Cryptocurrency mining

Surge in cryptocurrency crimes caused $761m loss in 2018: Report

0
According to a report from US-based cybersecurity firm CipherTrace, the first six months of this year experienced a huge surge in cryptocurrency exchange thefts. The...

MOST POPULAR

RECENT POSTS