Game Over! Chinese and Malaysian Hackers Charged for Computer Intrusion Campaigns
The U.S. Department of Justice (DoJ) charged five Chinese and two Malaysian hackers for their involvement in multiple computer intrusion campaigns from early 2014...
Attackers Target Govt. Computers at the National Informatics Centre
More than 100 computer systems of the National Informatics Centre (NIC) in India were compromised in a suspected malware attack. The NIC is part...
95% IT Pros are Confident About the Visibility of IoT Devices on Their Networks
The proliferation of the Internet of Things (IoT) devices in consumer, enterprise, and health care organizations, and their internal vulnerabilities has created a security...
Organizations Suffer Outbound Email Data Breaches Every 12 Working Hours
Egress, a provider of human layer data security solutions, stated that several organizations suffered data breach incidents due to outbound email errors in the...
Facebook Seeks Judicial Review Against Irish Data Regulator’s Ruling
Ireland reportedly ordered Facebook to stop transfers of EU users’ data back to the U.S., which was carried out under the Standard Contractual Clauses...
Russia-based APT28 Targets Election Campaigners and Political Organizations
APT28, also known as the “Fancy bear” or “Strontium” threat group, is reportedly backed by the Russian military intelligence agency GRU and has been...
India Reports Twice as Many Cyberattacks as any Other Country
While organizations are trying hard to cope with the new working conditions like connecting with remote employees and securing critical data at distributed networks,...
Five Practical Steps to Implement a Zero-Trust Network
While the concept of Zero Trust was created 10 years ago, the events of 2020 have thrust it to the top of enterprise security...
EC-Council Teases Its Next BIG Thing!
The world-renowned cybersecurity certification body, EC-Council, has teased what is touted to be the “new methodologies to revolutionize the future of cybersecurity education.” The...
Employees’ Social Media Use on Work Devices Lead to Security Risks: SMBs
The surge in remote work brought a new wave of security concerns, as many organizations believed that cyber habits of employees could compromise business...














