Home Search
COVID-19 - search results
If you're not happy with the results, please do another search
3 Ways the Federal Government Is Using Technology to Advance Cybersecurity
When it comes to cybersecurity, the federal government is putting out fires every day — and it can be exhausting. Like most organizations, the...
The Importance of Team Diversity in Detecting Phishing Scams
An email subject line catches a user’s interest. The user clicks through and gets compromised. This is a classic phishing attack; it remains one...
Discussing the Impact of the Kaseya Supply Chain Attacks
According to a GEP Research Report, the total cost of supply chain disruptions in 2020 was $4tn. While these disruptions were caused due to...
Top 5 Internet of Things (IoT) Hacking Tools Explained
Internet of Things (IoT) devices raise critical security concerns for ethical hackers as these devices are easy to hack with IoT hacking tools.
More than...
Misconfigured Microsoft Power Apps Inadvertently Exposed 38 Mn Sensitive Records
A configuration issue in Microsoft Power Apps resulted in a massive data breach, exposing the sensitive information of millions of users. An analysis from...
EC-Council Launches a Specialized Web Application Hacking and Security Certification
Albuquerque, New Mexico, August 3, 2021: EC-Council, creators of the Certified Ethical Hacker certification, have launched their latest training and certification program specifically for...
“I am eagerly waiting for more innovation in incident response and supply chain security”
According to Israel National Cyber Directorate, Israeli cyber companies raised $3.36 billion in the first half of 2021, an amount that constitutes about 41%...
A CEO’s Guide to Cybersecurity
Agile methodologies and cloud-based services and models have become popular, and in accordance with this change, the c-suite has restructured processes within their organizations....
CISA Provides Details on Top Routinely Exploited Vulnerabilities in 2020 and 2021
Organizations can boost their overall cybersecurity posture by regularly updating their network systems and patch vulnerabilities. Understanding how attackers leverage malicious techniques and the...
Alert! Fraudulent Call Centers Tricking Users to Download BazaLoader Malware
Microsoft 365 Defender Threat Intelligence Team uncovered an ongoing malware campaign tricking victims into downloading malware on the targeted systems. The campaign, dubbed as...