Home Search

online learning - search results

If you're not happy with the results, please do another search
Cybercriminals Abuse AI and ML for Launching Sophisticated Cyberattacks

Deepfakes: A Growing Cybersecurity Concern

0
In tandem with developments in cybersecurity technology, cybercriminals have started getting more innovative with their attacking techniques. Threat actors are leveraging advanced technologies like...
cybersecurity predictions 2021

2021 Predictions: Holistic, Centralized, Software-Defined, and Automated Security that is Everywhere

0
The year that has been 2020 has been a cornucopia for cybercriminals who have been able to feast off an extended attack surface, a...
Ransomware attacks, ransomware, Sinclair Broadcast group

Ransomware Attacks in 2020! These are 4 Most Affected Sectors

0
From a local food retailer to a multi-national company, ransomware attacks continue to loom over cyberspace. Ransomware operators target victims by encrypting their sensitive...
Avaddon ransomware, Microsoft and Fortinet flaws, apt

Watch Out for These Three Cyberthreats in 2021

0
The unexpected crisis in 2020 impacted almost every business globally. The turmoil resulted in several changes in the traditional business operation models. Even cybercriminals...
Artificial Intelligence, AL and ML

AI-Powered Cybersecurity: From Automated Threat Detection to Adaptive Defense

0
Cybersecurity, the protection of IT infrastructures and communication networks in cyberspace and cyber-physical systems, is becoming increasingly important, covering threat detection and security countermeasures...
DDoS Attacks

570% Increase in Bit-and-Piece DDoS Attacks: Research

0
The second quarter of 2020 witnessed an unprecedented increase in DDoS attacks compared to the same period last year. According to Nexusguard Q2 2020...
CYBERSEC Cybersecurity Forum

CYBERSEC: Make Cybersecurity a Global Effort

0
The Kosciuszko Institute successfully launched CYBERSEC Global 2020 on September 28. For the 6th time, the conference becomes a platform to discuss various paths...
blockchain-based social media, Parental Consent for Minors, Iranian Facebook accounts

McAfee Consumer Security Portfolio Integrates Social Media and Tech Scam Protection

0
With the home, school, and the office now becoming a common space for employees, the attack surface broadens to includes consumers and endpoints. Employees...
4 in 10 Companies Expose Unsafe Network Services Online, network and security

Five Practical Steps to Implement a Zero-Trust Network

0
While the concept of Zero Trust was created 10 years ago, the events of 2020 have thrust it to the top of enterprise security...

“Attackers are looking to break into your organization either by a broken VPN or...

0
It’s not every day that one gets to meet an influential person from the world of cybersecurity. CISO MAG caught up with Yotam Gutman,...

MOST POPULAR

RECENT POSTS

Cybersec Europe

HackVSIT 6.0

CyberX Bahrain

Infosecurity Europe