CDM Featured Whitepapers

Cybersecurity Insiders: 2018 Cloud Security Report

HelpSystems

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

Four Essential Strategies of Endpoint Security Protection

Absolute Software


News

ZoomEye IoT search engine cached login passwords for tens of thousands of Dahua DVRs

A security researcher discovered that the IoT search engine ZoomEye has cached login passwords…

Staying in Front of the Everchanging Cybersecurity Landscape

Like oxygen, the internet is everywhere, and is vital to the corporate ecosystem. Put…

2018 is Late but Still the Right Time to Bid Goodbye to Malware Prone SMBv1

Upgrade to an Encrypted SMB version 3 – avoid the next WannaCry (which exploited…

Spambot aims at targets WordPress sites in World Cup-Themed spam scam

Imperva observed a spambot targeting WordPress sites aimed at tricking victims into clicking on links…

Facebook faces £500,000 fine in the U.K. over Cambridge Analytica scandal

Facebook has been fined £500,000 ($664,000) in the U.K. for its conduct in the Cambridge…

Polar fitness app broadcasted sensitive data of intelligence and military personnel

The Mobile fitness app Polar has suspended its location tracking feature due to the…

How to Protect Your Organization from Spear Phishing

In April 2018, IT Governance reported that 75% of organizations have experienced “at least…

New Rakhni variant could infect systems with either a ransomware or a miner

Security researchers at  Kaspersky Labs have discovered a new strain of the Rakhni malware that could…

Chinese hackers breached into systems at Australian National University … and are still there

Chinese hackers breached into the systems of Australian National University (ANU) and according to the…

Crooks leverage obfuscated Coinhive shortlink in a large crypto-mining operation

Crooks leverage an alternative scheme to mine cryptocurrencies, they don’t inject the CoinHive JavaScript…

Show Buttons
Hide Buttons