Improving Cyber Hygiene with Greater Social Cybersecurity Engagement
You don’t have to look too far around to find someone who may not be practicing proper cyber hygiene in order to protect themselves...
Why It’s Time to Take Vendor Risk Management Seriously
Putting expensive locks on your doors helps secure your home. But what if you start giving away the keys? First, you give a set...
7 In 10 Financial Organizations Globally Have Suffered a Cyberattack
A research from cybersecurity firm Keeper Security revealed that lack of cybersecurity resources and strategies lead to an increase in the number of cyberattacks...
WeLeakData.Com Compromised, Hackers’ Private Messages Leaked
A database of an infamous darknet forum called WeLeakData.com was breached, exposing private messages of malicious actors who used the site. Cybercriminals used WeLeakData.com...
Top 10 Commonly Exploited Vulnerabilities Between 2016-2019
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader U.S. government released a list of the top...
Iran’s Strait of Hormuz Port Reports a Failed Attempt of Cyberattack
As per the reports shared with ILNA news agency, Ports and Maritime Organization’s systems (PMO) recently faced a failed attempt of cyberattack. Although the...
7TB of Data Leak Exposes Over 10 Bn Adult Website Records
The research team at Safety Detectives has discovered a data leak, which potentially exposed over 10 billion records of an Ireland-based adult live-streaming website...
Collaboration will be Integral in a Post COVID-19 World: Chris Roberts
CISO MAG recently hosted its second Fireside Chat with hacker, security researcher and CISO, Chris Roberts; the audience comprised of CISOs, security professionals and...
Lessons That Can Be Learned from Reviewing How We Manage Cybersecurity and Applying it...
In recent years, some in the cyber world recognized that there is a lot to learn from the biological world when protecting systems against...
Malware Alert! New Android Mobile Banking Trojan ‘EventBot’ Debuts
Researchers at Cybereason Nocturnus have discovered EventBot, a new type of Android mobile malware that exploits Android’s accessibility features. It steals the victim’s data...














