Home Search

online learning - search results

If you're not happy with the results, please do another search
Zoom, video conferencing, webinar, zoom two-factor authentication, top data breaches of 2020

Zoom’s Video-teleconferencing Platform Still at Risk: FBI Warns

0
Despite regular security updates and features, cyberthreats on Zoom applications have become rampant. In the wake of the pandemic, the popular video conferencing platform...
Multiple Banks and Telecoms in Hungary Affected in a DDoS Attack

DDoS Attacks Surge, DDoS Booters Used to Exploit D/TLS Servers

0
Cybersecurity experts found cybercriminals leveraging DDoS booters to exploit misconfigured or outdated Datagram Transport Layer Security (D/TLS) servers to launch Distributed Denial of Service (DDoS)...
IoT attacks

IoT Security Trends and Challenges in the Wake of COVID-19

0
Finally, we have arrived in the age of an Internet of Things (IoT) ecosystem, with connected devices deployed in our homes, workplace, and public...
COVID-19 Cyberthreats

Cybersecurity Top 5 Lessons Learned from COVID-19

0
At last, I went to a grocery shop with enough precautions after using multiple online delivery services for weeks. And I found that most...
Insider Threats

Insiders Threats: The Achilles Heel of Organizations

0
Information security expert and author Jason Coulls often keeps an eye on cybersecurity issues related to Canadian banks and telecommunication companies in his spare...
DDoS Attacks

DDoS Attacks Intensify in 2020 — Driven in Part by COVID-19 and 5G

0
Cybercriminals had a busy year in 2020, with rapidly increasing numbers of distributed denial of service (DDoS) weapons, widespread botnet activity, and some of...
“PerSwaysion” Phishing Campaign Targets High-Ranked Professionals Across The Globe, IKEA email reply-chain attack

Here’s Why You Are More Likely to Be Targeted with a Phishing Email

0
Threat actors constantly innovate and adopt new techniques to perform their phishing activities successfully. They often leverage compromised email IDs, login credentials, and other...
4 in 10 Companies Expose Unsafe Network Services Online, network and security

Securing Bytes to Prevent Bites in the Enterprise Network

0
Today, everywhere you turn, there are warnings about the surge in cybercrimes, as miscreants take advantage of the globe's newfound dependence on the virtual...
Dmitry Volkov interview

“The battle for the vaccine market to launch cyberattacks has already begun”

0
As a first-year student at Russia’s leading engineering university, the Moscow State Technical University of N.E. Bauman, Dmitry Volkov co-founded Group-IB, a cyber investigations...
Artificial Intelligence

Artificial Intelligence and Cybersecurity: A Double-Edged Sword

0
As artificial intelligence (AI) becomes a hot topic, there is also an increasing amount of misinformation and confusion about what it can do and...

MOST POPULAR

RECENT POSTS

Cybersec Europe

HackVSIT 6.0

CyberX Bahrain

Infosecurity Europe