CDM Featured Whitepapers

Defending Against Data Breach

Linoma

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

SureID

A Culture of Cybersecurity: The Only Way Forward

Logical Operations


News

Machete espionage campaign continues to target LATAM countries

The threat group behind the Machete cyber espionage campaign first spotted in 2014 continues…

Once again Three mobile customers in UK experienced data breach

UK Three mobile customers experienced a new data breach, this time a technical issue…

Kirk ransomware – A Star Trek Themed Ransomware that requests Monero payments

The researchers have discovered a new piece of ransomware featuring a Star Trek theme,…

Global DDoS Threat Landscape Q4 2016 – US, UK and Netherlands top attacked countries

Imperva published the Global DDoS Threat Landscape Q4 2016, according to the experts the…

New MajikPOS Malware targets users across North America

Trend Micro has discovered a new PoS malware, tracked as MajikPOS, that is targeting…

Flaws in MAC address randomization implemented by vendors allow mobile tracking

Researchers devised a new attack method that can be leveraged to track mobile devices…

Check Point experts spotted pre-Installed Android Malware on 38 Android devices

Experts discovered pre-installed malware on 38 high-end smartphone models belonging to popular manufacturing companies…

INTERPOL World 2017 builds up momentum with strong support from public and private sectors

SINGAPORE – The second edition of INTERPOL World has garnered strong support from public…

WikiLeaks releases documents detailing CIA hacking tools and capabilities

WikiLeaks has obtained thousands of files allegedly originating from a CIA high-security network that…

A bug in Twitter allowed hackers to access to locked accounts until October

A flaw in Twitter allowed attackers to access locked accounts bypassing the locking mechanism…

Show Buttons
Hide Buttons