Combatting Industry Burnout by Building Resilient Security Teams

By Rick McElroy, Principal Cybersecurity Strategist, VMware We have reached a pivotal point in the history of cybersecurity. Catalyzed by the shift to an anywhere-work environment during COVID-19, attack surfaces […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Combatting Industry Burnout by Building Resilient Security Teams

XLoader, a $49 spyware that could target both Windows and macOS devices

Check Point Research (CPR) experts have spotted a cheap malware, dubbed XLoader variant, which was upgraded to target both Windows and macOS PCs. XLoader is a very cheap malware strain that […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on XLoader, a $49 spyware that could target both Windows and macOS devices

ChaChi, a GoLang Trojan used in ransomware attacks on US schools

A new Trojan written in the Go programming language, tracked as ChaChi, was involved in ransomware attacks against government agencies and US schools. Researchers from BlackBerry Threat Research and Intelligence […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on ChaChi, a GoLang Trojan used in ransomware attacks on US schools

Contactless Passwordless Auto Login

with the most innovative NFC hardware password manager which received the Global Infosec Awards 2021 By Jacques GASCUEL, CEO of Freemindtronic On a daily basis, every company, regardless of its […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Contactless Passwordless Auto Login

Executive Protection Needs to Include Digital

By Dr. Chris Pierson, Founder & CEO, BlackCloak Major firms and corporations already know full well the risks and dangers inherent to their executives’ security. Executive Protection is an established […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Executive Protection Needs to Include Digital

Android stalkerware, a danger for victims and stalkers

ESET research shows that Android stalkerware apps are affected by vulnerabilities that further threaten victims. ESET research reveals that common Android stalkerware apps are affected with vulnerabilities that could expose […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Android stalkerware, a danger for victims and stalkers

Boffins found a bug in Apple AirDrop that could leak users’ personal info

Experts found a bug in Apple’s wireless file-sharing protocol Apple AirDrop that could expose user’s contact information. Boffins from the Technical University of Darmstadt, Germany, have discovered a privacy issue […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Boffins found a bug in Apple AirDrop that could leak users’ personal info

Gap of The Red Team from The Leak of Fireeye

Use “Imaginary Enemy” methodology to mitigate APT Attack By Jamal Uddin Shaikh, Cybersecurity Architect and Technology Lead , Appxone Introduction Early in the morning, I was pulled up by the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Gap of The Red Team from The Leak of Fireeye

Cyberattacks could pose a material risk to water and sewer utilities

Fitch Ratings is warning that cyberattacks could pose a risk to water and sewer utilities potentially impacting their ability to repay debt. Fitch Ratings Inc. is an American credit rating […]

Posted in Cyber Security News | Tagged , , , , , , , | Comments Off on Cyberattacks could pose a material risk to water and sewer utilities

Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe

By Sridhar Iyengar, MD, Zoho Europe Large tech corporations have started turning into surveillance companies, tracking the behaviour of businesses and users who have become heavily reliant on their services […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe

More Power, More Responsibility

What the Defense and Intelligence Communities Need to Know About 5G By Brian Green, Senior Vice President, Booz Allen Hamilton With the potential to revolutionize global telecommunications, fifth-generation mobile technology […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on More Power, More Responsibility

Protecting Human Rights in The Era of Cyber Information Warfare

By Edwin Weijdema, Global Technologist, Product Strategy at Veeam Disinformation is undermining the limitless potential of technology to be a positive force for industries, businesses and communities. In the current […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Protecting Human Rights in The Era of Cyber Information Warfare

Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X