Home Search

remote work - search results

If you're not happy with the results, please do another search
cyberthreats, bug

Everything You Need to Know About the Evolution of Cyberthreats

0
The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An...
Ransomware attacks, LockBit Ransomware

After Phishing and Identity Thefts, LockBit 2.0 Operations Rise in Australia

0
Australians have become a target for different kinds of cyberattacks lately. The Australian Competition and Consumer Commission (ACCC) reported an 84% surge in identity theft...
SMBs cybersecurity, Cybersecurity skills, Conti Ransomware Group Reportedly Stole 1.5TB Of Data from JVCKenwood

These are the Top 4 Cybersecurity Skills In-demand in 2021

0
Amidst growing cybercrime and cyberthreats, it is wise for businesses to hire professionals with cybersecurity skills. The pandemic-induced lockdown has changed the way we...

EC-Council Launches a Specialized Web Application Hacking and Security Certification

0
Albuquerque, New Mexico, August 3, 2021: EC-Council, creators of the Certified Ethical Hacker certification, have launched their latest training and certification program specifically for...
data management excellence

How to Ensure Data Management Excellence

0
In response to high-profile data breaches, staggering fines, and rapidly evolving privacy and data requirements, CIOs and CISOs are facing a critical mandate: to...
BazaCall BazaLoader

Alert! Fraudulent Call Centers Tricking Users to Download BazaLoader Malware

0
Microsoft 365 Defender Threat Intelligence Team uncovered an ongoing malware campaign tricking victims into downloading malware on the targeted systems. The campaign, dubbed as...
Log4j, Iranian Ransomware Actors, SpoofedSccholars, second-tier targets, NIOPDC

Iran Leak Hints at Second Tier Targets as Next Terror Gateway

0
In May 2020, CISO MAG reported about Project Signal, an Iranian state-sponsored ransomware operation.  State-sponsored actors from Iran have often been linked to various...
digital forensics, cyber forensics, forensics, digital identity

How Digital Forensics Complements Cybersecurity

0
Analyzing pieces of evidence found in a digital device is a laborious task. The challenges of which are further augmented by the ever-changing methods...
Vulnerabilities in Zimbra

Two Critical Vulnerabilities Identified in Zimbra Webmail Solution

0
Unpatched vulnerabilities are a gateway for hacker intrusions. They make cybercriminals’ jobs easy to break into targeted network systems. Cybersecurity experts from security firm...
Pegasus Spyware, Mobile Security, spyware

eScan’s Mobile Security Application Capable of Detecting and Blocking Pegasus Spyware

0
Pegasus spyware from the NSO Group has made it to the global mainstream media, thanks to it being at the core of a major...