Home Search

U.S. - search results

If you're not happy with the results, please do another search
Chinese actors target telecom

Game Over! Chinese and Malaysian Hackers Charged for Computer Intrusion Campaigns

0
The U.S. Department of Justice (DoJ) charged five Chinese and two Malaysian hackers for their involvement in multiple computer intrusion campaigns from early 2014...
Thales

Attackers Target Govt. Computers at the National Informatics Centre

0
More than 100 computer systems of the National Informatics Centre (NIC) in India were compromised in a suspected malware attack. The NIC is part...
Number of IoT Devices Expected to Reach 24.1 Bn in 2030: Report

95% IT Pros are Confident About the Visibility of IoT Devices on Their Networks

0
The proliferation of the Internet of Things (IoT) devices in consumer, enterprise, and health care organizations, and their internal vulnerabilities has created a security...
BEC Scammers Exploit Email Auto-Forwarding Rules, FBI warns

Organizations Suffer Outbound Email Data Breaches Every 12 Working Hours

0
Egress, a provider of human layer data security solutions, stated that several organizations suffered data breach incidents due to outbound email errors in the...
Facebook Takes Down Hundreds of Fake Accounts Under Coordinated Inauthentic Behavior

Facebook Seeks Judicial Review Against Irish Data Regulator’s Ruling

0
Ireland reportedly ordered Facebook to stop transfers of EU users’ data back to the U.S., which was carried out under the Standard Contractual Clauses...
Russia-based APT29 Targets COVID-19 Vaccine Research

Russia-based APT28 Targets Election Campaigners and Political Organizations

0
APT28, also known as the “Fancy bear” or “Strontium” threat group, is reportedly backed by the Russian military intelligence agency GRU and has been...
Acronis Cyber Readiness Report, cyberattacks in India, cybercrime in India, India’s Private Sector

India Reports Twice as Many Cyberattacks as any Other Country

0
While organizations are trying hard to cope with the new working conditions like connecting with remote employees and securing critical data at distributed networks,...
4 in 10 Companies Expose Unsafe Network Services Online, network and security

Five Practical Steps to Implement a Zero-Trust Network

0
While the concept of Zero Trust was created 10 years ago, the events of 2020 have thrust it to the top of enterprise security...

EC-Council Teases Its Next BIG Thing!

0
The world-renowned cybersecurity certification body, EC-Council, has teased what is touted to be the “new methodologies to revolutionize the future of cybersecurity education.” The...
blockchain-based social media, Parental Consent for Minors, Iranian Facebook accounts

Employees’ Social Media Use on Work Devices Lead to Security Risks: SMBs

0
The surge in remote work brought a new wave of security concerns, as many organizations believed that cyber habits of employees could compromise business...