Home Search

ransom - search results

If you're not happy with the results, please do another search
IoT attacks

Check Point Software Technologies Has New IoT Cybersecurity Solution

0
Check Point Software Technologies, a leading provider of cybersecurity solutions globally, today announces a new IoT cybersecurity technology.  Check Point claims to be the...
Supply chain

Don’t Overlook the Security of Your Supply Chain

0
CISO MAG EDITORIAL Not long ago, the IT Head---and we are using this as a generic term--of an organization was concerned with securing all the...
trend micro's 2020 predictions

Trend Micro’s 2020 Predictions – Escalating Cloud and Supply Chain Risk

0
Trend Micro Incorporated today announced its 2020 predictions report, which states that organizations will face a growing risk from their cloud and the supply...
Yahoo

URL Hijacking on the Sprawl, Holiday Shoppers Beware

0
Holidays are near and we don’t have time to buy gifts. What do we do? Shop online. Unfortunately, as online shopping continues to grow,...
Michael Estevez, Executive Vice President, Managing Director and Cybersecurity Crisis Team Lead, BCW

“Observe the trinity of cybersecurity crisis communications: Forensics, Legal, Communications”

0
In his role as an executive vice president/managing director in BCW’s New York Public Affairs & Crisis practice, Michael Estevez advises clients on crisis...
Rootkits, Mobile Malware in Asia

Researchers Uncover Mass Malware Attack

0
Security experts discovered a Mass Malware Distribution campaign that using popular political personalities in the U.S. including President Donald Trump, Hillary Clinton with a...
zero trust

Thwarting Graboid and Protecting Containers with Zero Trust

0
By Dan Perkins, director of product management, Edgewise Networks Recently, security researchers discovered a new worm that targets unsecured Docker daemons that are exposed to...
Surveillance Legislation (Identify and Disrupt) Amendment Bill

Two Ex-Employees of Twitter Caught Spying for Saudi Arabia

0
Two former employees of Twitter have been recently charged for spying on thousands of Twitter user accounts on behalf of the Saudi Arabian government. According...
Insider attacker leak data

Insider Sold 68K Customer Records to Scammers: Trend Micro

0
Cybersecurity and defense company Trend Micro revealed that one of its employees illegally accessed and sold personal information of around 68,000 of its customers. The...
anti-hacking

5 Cybersecurity Solutions to Steamroll Hackers and Scammers in 2020

0
By Joshua Blackborne Cyberattacks have become a part of the reality of doing business in today’s digital landscape. Almost every company relies on computers, digital...