CDM Featured Whitepapers

Defending Against Data Breach

Linoma

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

A Culture of Cybersecurity: The Only Way Forward

Logical Operations


News

German regulators ban the My Friend Cayla doll fearing it is a surveillance device

German regulators have banned ‘My Friend Cayla,’ an internet-connected doll that can chat with…

Yahoo notifies users hackers are forging “cookies” to take over their accounts

Yahoo notifies users that hackers are forging “cookies” or files used in the authentication…

Operation Kingphish: Cyber Attacks against human rights activists in Qatar and Nepal

Amnesty International has recently uncovered a spear phishing campaign dubbed Operation Kingphish that targeted…

Watering hole attacks on Polish Banks Linked to Lazarus Group

According to security experts from Symantec and BAE Systems, the recently discovered attacks aimed…

Crooks hacked Polish banks with a malware planted on Government site

Several Polish banks confirmed their systems were infected with a malware after their staff…

The Slammer worm is back after 13 years to target ancient SQL servers

The SQL Slammer worm, one of the most long-lived malware, now seems to be…

12 InterContinental Hotels Group properties suffer massive data breach

Hackers compromised payment systems at 12 US properties of the InterContinental Hotels Group and…

Russian APT 29 group launched cyber attacks against Norwegian authorities

The Norwegian intelligence agency PST is one of the targets of spear phishing attacks…

Hacking printers exploiting Cross-site printing (XSP) attacks

A group of researchers from the University Alliance Ruhr has found a cross-site printing…

Hundreds of thousands, if not over a million Netgear routers open to hack

Hundreds of thousands of Netgear routers are vulnerable to password bypass, the company issued…

Show Buttons
Hide Buttons