The State of Ransomware: From Evolution to Progression
CISO MAG, in association with Cybereason, conducted a virtual round table discussion on “The State of Ransomware”.
The panel discussed the evolution and the new...
Web Application Attacks Increases 8x in H1 2020
A cybersecurity report from cloud security provider CDNetworks revealed that distributed denial-of-service (DDoS), web application, and botnet attacks have surged exponentially in H1 2020...
State Actors Using MobileIron’s Vulnerability to Target UK Organizations: NCSC
In June 2020, MobileIron reported a critical RCE vulnerability registered under CVE-2020-15505. The vulnerability was fixed in its security update released on June 15,...
Hanna Andersson to Pay $400K to Settle CCPA-related Class-Action Lawsuit
Hanna Andersson, U.S.-based kids wear retailer, has agreed to pay $400,000 to settle a data breach lawsuit related to the California Consumer Privacy Act...
Third-Party Risk: Reactive to Predictive
Third-party risk management: the process, technology, and people whose goal is to lower the risk created by third-parties (vendors). Surveys of a wide range...
Chinese E-Commerce Scammers Trade Customer PII and Payment Card Data on Dark Web
A Chinese e-commerce cyber-espionage campaign is suspected to be illicitly collecting payment information of unwitting consumers via hundreds of fraudulent e-commerce websites that appear...
Google Set to Bring End-to-End Encryption in Android Messaging
Google is finally ready to roll out end-to-end encryption (E2EE) in its latest RCS standard for Android messaging.
With this upgrade, Google has taken its...
Web Hosting Provider Managed.com Suffers Ransomware Attack
Managed web hosting provider Managed.com has temporarily taken down its servers and web hosting systems after suffering a suspected ransomware attack. In a security...
21 Questions to Determine if Your MSP is Ready for Prime Time or is...
As if 2020 wasn’t challenging enough for businesses, reports warn that Managed Service Providers (MSPs), often contracted to provide outsourced IT and cybersecurity services,...
Senate Passes IoT Cybersecurity Improvement Bill by Unanimous Consent
The Senate, on November 17, 2020, approved the Internet of Things Cybersecurity Improvement Act (H.R. 1668) by unanimous consent and sent it to the...