Home Search
remote work - search results
If you're not happy with the results, please do another search
Everything You Need to Know About the Evolution of Cyberthreats
The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An...
After Phishing and Identity Thefts, LockBit 2.0 Operations Rise in Australia
Australians have become a target for different kinds of cyberattacks lately. The Australian Competition and Consumer Commission (ACCC) reported an 84% surge in identity theft...
These are the Top 4 Cybersecurity Skills In-demand in 2021
Amidst growing cybercrime and cyberthreats, it is wise for businesses to hire professionals with cybersecurity skills. The pandemic-induced lockdown has changed the way we...
EC-Council Launches a Specialized Web Application Hacking and Security Certification
Albuquerque, New Mexico, August 3, 2021: EC-Council, creators of the Certified Ethical Hacker certification, have launched their latest training and certification program specifically for...
How to Ensure Data Management Excellence
In response to high-profile data breaches, staggering fines, and rapidly evolving privacy and data requirements, CIOs and CISOs are facing a critical mandate: to...
Alert! Fraudulent Call Centers Tricking Users to Download BazaLoader Malware
Microsoft 365 Defender Threat Intelligence Team uncovered an ongoing malware campaign tricking victims into downloading malware on the targeted systems. The campaign, dubbed as...
Iran Leak Hints at Second Tier Targets as Next Terror Gateway
In May 2020, CISO MAG reported about Project Signal, an Iranian state-sponsored ransomware operation. State-sponsored actors from Iran have often been linked to various...
How Digital Forensics Complements Cybersecurity
Analyzing pieces of evidence found in a digital device is a laborious task. The challenges of which are further augmented by the ever-changing methods...
Two Critical Vulnerabilities Identified in Zimbra Webmail Solution
Unpatched vulnerabilities are a gateway for hacker intrusions. They make cybercriminals’ jobs easy to break into targeted network systems. Cybersecurity experts from security firm...
eScan’s Mobile Security Application Capable of Detecting and Blocking Pegasus Spyware
Pegasus spyware from the NSO Group has made it to the global mainstream media, thanks to it being at the core of a major...