Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?

A cyber attack has disrupted the Australian Channel Nine’s live broadcasts, the company was unable to transmit its Sunday morning news program. A cyber attack has hit the Australian Channel Nine’s live […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?

Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East

By Mazen A. Dohaji, Vice President, India, Middle East, Turkey & Africa (iMETA), LogRhythm. Throughout 2020, enterprises and public sector organizations across the Middle East have been managing disruption and […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East

REvil ransomware gang hacked Acer and is demanding a $50 million ransom

Taiwanese multinational hardware and electronics corporation Acer was victim of a REvil ransomware attack, the gang demanded a $50,000,000 ransom. Taiwanese computer giant Acer was victim of the REvil ransomware attack, the gang […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on REvil ransomware gang hacked Acer and is demanding a $50 million ransom

Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021

As we enter a new era of interconnected cybersecurity threats, companies and organizations would be wise to overhaul their entire view of the online landscape in order to be fully […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021

Moving to Active Defense: What It Means, How It Works and What You Can Do Now

By Ofer Israeli, CEO and founder, Illusive Networks Despite the myriad cybersecurity solutions out there, breaches, attacks and exploitations continue. The old approach isn’t working; cybersecurity teams need to move […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Moving to Active Defense: What It Means, How It Works and What You Can Do Now

Does Sunburst Have Your Confidential Emails and Database Data?

By Randy Reiter CEO of Don’t Be Breached So far three malware strains have been identified in the SolarWinds supply chain attack. They are the SUNBURST, SUPERNOVA, and TEARDROP malware […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Does Sunburst Have Your Confidential Emails and Database Data?

CD Projekt Red game maker discloses ransomware attack

The gaming firm CD Projekt Red, which developed popular games like Cyberpunk 2077 and The Witcher, has disclosed a ransomware attack. The gaming firm CD Projekt Red, which developed popular […]

Posted in Cyber Security News | Tagged , , , , , , , | Comments Off on CD Projekt Red game maker discloses ransomware attack

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X