Tag: cybersecurity
Repository Blunder! GitHub Data Leak Incidents Impact Over 200,000 U.S. Patients
Netherlands-based ethical hacker Jelle Ursem, in association with Databreaches.net, uncovered nine data breach incidents at multiple health care providers. The data breach exposed medical...
Customized Automation: How to Optimize VRM
Vendor risk management (VRM) is a big problem. Vendors are cybercriminals’ favorite avenue of attack. 61% of the U.S. organizations experienced data breaches caused...
Cryptocurrency Seizure! U.S. Govt Disrupts Three Cyber-Enabled Terrorist Campaigns
The U.S. Department of Justice (DOJ) announced the seizure of three cyber-enabled terrorist financing campaigns, involving the al-Qassam Brigades, Hamas’s military wing, al-Qaeda, and...
How to Safeguard Your Cryptocurrency Wallet from Digital Exploits
Recently, the largest cryptocurrency, Bitcoin, rose to more than $12,000 in trading value, which is its highest level since August 2019. The price swings...
What are the Security Concerns of Working Remotely
Remote working has raised many concerns for businesses of all sizes.
By Stevie Nicks, Digital Editor at Just Another Magazine
How do you retain a high...
Data Concealment: An Innovative Weapon for Every Defender’s Toolkit
Despite investments in security modernization and layered security controls, cyberattacks are consistently occurring - particularly during the COVID-19 crisis, as businesses operate with highly...
Threat Alert! Amazon Alexa “One-Click” Attack Could Jeopardize Personal Data
The researchers from Check Point discovered critical security flaws in Amazon’s Alexa virtual assistant platform that could allow threat actors to obtain users’ personal...
Attention Bug Hunters! FireEye’s Private Bug Bounty Program Goes Public
Cybersecurity company FireEye, announced that it is making its private bug bounty program public, with a focus on business applications and corporate infrastructure security....
LANDSCAPE: Be a Part of the Change
Mumbai, India – Aug 7, 2020: EC-Council’s CISO MAG is proud to announce The APAC CISO Summit, themed ‘Cybersecurity in a Hyperconnected Ecosystem,’ on August...
How to Leverage a Contact-free Authentication Solution for the Workforce
Employees face a challenge daily, actually multiple times per day, having to access multiple systems and applications throughout the day to do their job....