Home Search

ICO - search results

If you're not happy with the results, please do another search
Artificial Intelligence, AL and ML

The Future of AI in Cybersecurity

0
By Dick Wilkinson, C|CISO The buzzword for 2019 that we have all heard a thousand times is Artificial Intelligence, AI. This term has been placed...
Board meeting, CISO, leadership

Are CISOs failing in their communication to the Board?

0
CISO MAG Editorial The volume of security attacks and threats to organizations has reached alarming proportions, so much so that “cybersecurity” and “cyber risk” have...
BotenaGo, malware over encrypted connections

Attackers used “Cutlet Maker” Malware in Jackpotting Attacks on ATMs in Germany

0
Cybersecurity experts found a new trace of an ATM Jackpotting Attack via infamous ATM malware named Cutlet Maker. The researchers opined that the usage...
U.S. and Australia to Jointly Develop Cyber Training Platform

IBM and McAfee Spearhead Formation of Open Source Cybersecurity Alliance

0
In a bid to provide interoperability and data-sharing across several cybersecurity products and companies, IBM Security and McAfee are spearheading an open-source cybersecurity alliance...
Startup Investment

Cybersecurity startup Kenna Security raises US$ 48 Million

0
Risk-based vulnerability cybersecurity startup Kenna Security recently announced that it has raised US$ 48 million in a Series D funding round led by Sorenson...
Tesla avoids cyberattack, tesla zero-click vulnerabilities

How Tesla has always vouched for safe and secure cars

0
By Augustin Kurian Until the late 2000s, electric cars had a reputation for being ugly and slow. This was until a small Silicon Valley startup...
bounty for DarkSide Ransomware Group, Microsoft Offers $100,000 Bounty

Uber rewarded a security researcher with US$ 6500 bounty for spotting a bug

0
Uber has paid US$ 6500 to an Indian security researcher after he discovered a bug in its API requests.  According to the official statement, the...

Attackers use ‘Deepfake’ Voice Software to steal US$243,000

0
In what can be considered a sophisticated Vishing attack, cybercriminals used voice-mimicking software to imitate a company’s CEO voice to trick the other party...
Misconfigured AWS S3 Bucket Exposes PII of up to 350,000 SSL247 Customers

Unprotected Database Exposes Millions of Facebook users’ Contact Numbers

0
An unprotected server hosting a database leaked millions of Facebook users’ phone numbers online. According to TechCrunch, the server wasn’t password-protected, allowing anyone to...
GO SMS Pro Android App Still Vulnerable to Data Exposure

Millions of Android Phones vulnerable to ‘Provisioning Attack’

0
Security experts revealed that more than half of modern Android smartphones, including models by Sony, LG, Samsung, and Huawei are vulnerable to a text-based...