Home Search

U.S. - search results

If you're not happy with the results, please do another search
vishing attacks

FBI and CISA Issue a Lookout for Vishing Attacks

0
The U.S. law enforcement bodies, the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA), have in a joint advisory warned...
COVID-19 Cyberthreats

Business in the Post-Pandemic Era: New Normal or a Digital Normal?

0
The business world is completely disrupted today.  Unemployment rates are soaring. Across industries, companies are downsizing operations and putting employees on furlough or issuing...
Facebook Indicts Two Developers for Scraping Users’ Data, Europol

Binance and Ukraine Police Arrest Crypto Hackers in a “Bulletproof Exchanger Project”

0
A collaboration between cryptocurrency exchange Binance and the law enforcement authorities in Ukraine helped identify a cybercriminal group that is involved in a $42...
Top Cybersecurity Jobs in 2021

Customized Automation: How to Optimize VRM

0
Vendor risk management (VRM) is a big problem. Vendors are cybercriminals’ favorite avenue of attack. 61% of the U.S. organizations experienced data breaches caused...
ONUS Log4j, Cryptocurrency Wallet Security

How to Safeguard Your Cryptocurrency Wallet from Digital Exploits

0
Recently, the largest cryptocurrency, Bitcoin, rose to more than $12,000 in trading value, which is its highest level since August 2019. The price swings...
Data breach in 100 U.S. cities

Unsecured Database Exposes 5.5 Mn Records of Multiple Organizations

0
Inadvertent database exposure continues to be a major risk for organizations. Security professionals are concerned about their database security as employees are now working...
quantify business risk, Adam Palmer, Chief Cybersecurity Strategist, Tenable

“You can’t quantify business risk with RAG color coded scores”

0
A recent study by Forrester Research shows that 97% of Indian organizations experienced at least one business-impacting cyberattack in the past 12 months. Yet,...
ProxyShell Vulnerabilities

“Ghostwriter” Uses Fabricated News as an Attack Vector

0
Security experts from FireEye discovered a fake news campaign spreading false stories, quotes, and other documents related to the North Atlantic Treaty Organization (NATO)....
CynergisTek Partners with Awake Security to Boost Cybersecurity in Health Care

CynergisTek Partners with Awake Security to Boost Cybersecurity in Health Care

0
Information security provider CynergisTek and network detection and response company Awake Security joined hands to help protect health care providers from cyberthreats. The California-based...
Cloud Forensics

Need Based Evaluation of Cloud Services in the Wake of COVID-19

0
For many organizations, particularly those that may be considered legacy, or older existing enterprises, the recent COVID-19 pandemic may be pushing them to further...