Home Search

phishing - search results

If you're not happy with the results, please do another search
cyber-tech trends

Seven Impactful Cyber-Tech Trends of 2020 and What it Means for 2021

0
Every year I like to research and commentate on the most impactful security technology and business happenings from the prior year. This year is...
data breaches, top 9 data breaches, top data breaches in 2020, data breaches in 2020, data breach 2020, top data breaches, twitter hack, twitter data breach, Zoom data breach, Unacademy data breach, BigBasket data breach, Nintendo data breach, Marriot data breach, EasyJet data breach, SolarWinds hack, SolarWinds hacking, SolarWinds data breach,

A Look Back at the Top 9 Data Breaches of 2020

0
At the beginning of the year, people celebrated the turn of the decade and readied themselves to strike off the “Things-to-Do” from their bucket...
Artificial Intelligence, AI, neural, machine learning

Greater Cybersecurity Threat Predictions with a Primer in Machine Learning

0
With the increased number of cyberattacks, especially in light of the COVID-19 pandemic, the process of manually or semi-automatically receiving cyberthreat alerts that need...
devsecops

‘DevSecOps’ Mitigates Cybersecurity Risk from Digital Transformation

0
Achieving customer value with any digital transformation initiative requires an organizational and cultural shift across the enterprise to align people’s efforts with customer priorities....
Compromised Email Accounts

Leaked Ledger Database Dumped on Raidforums Dark Market

0
Cryptocurrency wallet manufacturer Ledger is facing the consequences of a data leak on its website, which took place in June 2020. The company recently...
Insider Threats

What Edward Snowden Taught Us About Insider Threats

0
We all know the name, Edward Snowden. Variously described as a whistleblower, hero, or even a traitor, in the security community, he is what...
Healthcare Data Breaches, Premier Diagnostics data exposed

How Cyberattacks Cause Severe Hazards to Health Care Industry

0
Cyberattacks on health care organizations have become rampant in 2020. With multiple data breaches and ransomware attacks, the health care providers continued to be...
Insider attacker leak data

Insider Threats: A Byproduct of the New Normal

0
Despite the continuous security improvements, the concern over insider threats seems to be growing for organizations globally. The new distributed working conditions have also...
Credential Abuse Attack, credential harvesting campaign

APTs: The Epidemic That Went Under the Radar

0
Identifying cyber threats and anomalies is like finding a needle in a haystack. It is safe to say that with advanced persistent threats (APTs)...
Microsoft Azure App, Zero-Day Vulnerability

Moving from Human Error to Human Firewall

0
Cybersecurity experienced multiple challenges in 2020. Rapid digitalization and the new normal — work from home — brought new opportunities as well as risks....