FBI and CISA Issue a Lookout for Vishing Attacks
The U.S. law enforcement bodies, the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA), have in a joint advisory warned...
Business in the Post-Pandemic Era: New Normal or a Digital Normal?
The business world is completely disrupted today. Unemployment rates are soaring. Across industries, companies are downsizing operations and putting employees on furlough or issuing...
Binance and Ukraine Police Arrest Crypto Hackers in a “Bulletproof Exchanger Project”
A collaboration between cryptocurrency exchange Binance and the law enforcement authorities in Ukraine helped identify a cybercriminal group that is involved in a $42...
Customized Automation: How to Optimize VRM
Vendor risk management (VRM) is a big problem. Vendors are cybercriminals’ favorite avenue of attack. 61% of the U.S. organizations experienced data breaches caused...
How to Safeguard Your Cryptocurrency Wallet from Digital Exploits
Recently, the largest cryptocurrency, Bitcoin, rose to more than $12,000 in trading value, which is its highest level since August 2019. The price swings...
Unsecured Database Exposes 5.5 Mn Records of Multiple Organizations
Inadvertent database exposure continues to be a major risk for organizations. Security professionals are concerned about their database security as employees are now working...
“You can’t quantify business risk with RAG color coded scores”
A recent study by Forrester Research shows that 97% of Indian organizations experienced at least one business-impacting cyberattack in the past 12 months. Yet,...
“Ghostwriter” Uses Fabricated News as an Attack Vector
Security experts from FireEye discovered a fake news campaign spreading false stories, quotes, and other documents related to the North Atlantic Treaty Organization (NATO)....
CynergisTek Partners with Awake Security to Boost Cybersecurity in Health Care
Information security provider CynergisTek and network detection and response company Awake Security joined hands to help protect health care providers from cyberthreats. The California-based...
Need Based Evaluation of Cloud Services in the Wake of COVID-19
For many organizations, particularly those that may be considered legacy, or older existing enterprises, the recent COVID-19 pandemic may be pushing them to further...














