CDM Featured Whitepapers

Cybersecurity Insiders: 2018 Cloud Security Report

HelpSystems

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

Four Essential Strategies of Endpoint Security Protection

Absolute Software


News

Breaking News: Supply Chain Attack Operation Red Signature Targets South Korean Organizations

Trend Micro Research, along with researchers from IssueMakersLab, recently discovered a supply chain attack…

Unusual Malspam campaign targets banks with Microsoft Publisher files

Researchers from Trustwave have uncovered a malspam campaign targeting banks with the FlawedAmmyy RAT. The peculiarity of this malspam campaign…

An Australian schoolboy hacked into Apple Servers and stole 90GB of secure files

According to Australian media, a teen hacker broke into Apple mainframe and downloaded 90GB…

Breaking News: NIST Small Business Cybersecurity Law

President Donald J. Trump has just signed the NIST Small Business Cybersecurity Act into…

Operation Eligible Receiver – The Birthplace of Cybersecurity: Vulnerabilities

More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver…

Beyond GDPR: key cyber security concerns

GDPR has now been in force for over two months and has brought with…

FOUR CONCRETE WAYS THREAT INTELLIGENCE CAN MAKE ORGANIZATIONS SAFER

by Jonathan Zhang, Founder and CEO, Threat Intelligence Platform, A Cyber Defense Magazine Exclusive…

Oracle warns of CVE-2018-3110 Critical Vulnerability in Oracle Database product, patch it now!

Last week Oracle disclosed a critical vulnerability in its Oracle Database product, the issue…

DNS Hijacking targets Brazilian financial institutions

Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake…

DNS Hijacking targets Brazilian financial institutions

Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake…

Show Buttons
Hide Buttons