19.2 C
Munich
Wednesday, May 15, 2024
- Advertisement -

ARCHIVE

Yearly Archives: 2020

Don’t FAIL your DLP Program

So you want to implement a Data Loss Prevention Program to secure your data. You go ahead and purchase one of the top rated(?)...

PenTest Reports That Bring Value to your Customer

Penetration testing is an activity which is meant to help the business take the appropriate actions to secure their systems from malicious actors. For...

The Basics of IT Security Audit

An IT security audit is an evaluation of the security of a company's information systems by measuring how well they conform to a set...

US Secret Service: Rise in hacks of managed service providers (MSPs)

The US Secret Service sent out a security alert last month to the US private sector and government organizations warning about an increase in...

Types of Man-In-The-Middle Attacks

What is a MITM Attack Man In The Middle (MITM) are common attacks that allow attackers to "listen" to communication between two parties. When two...

Famous mobile apps are spying on you!

During the last few weeks there have been several occasions where famous and widely used mobile applications have been caught on spying on your...

Compliance Does Not Equal Security

It is important to understand that being compliant does not necessarily mean that your organization is secure. You need to understand why and how security...

Hackers extorted $1.14m from University of California, San Francisco

A leading medical-research institution working on a cure for Covid-19 has admitted it paid hackers a $1.14m (£910,000) ransom after a covert negotiation witnessed...

Indian government hack exposes 80,000 coronavirus patients’ data

Indian hackers claim to have accessed more than 80,000 coronavirus patients’ healthcare records that were insecurely stored on government servers. The group, which calls itself Kerala...

Fileless Malware Are NOT New But Are Still Dangerous

WHAT IS IT Fileless malware is an advanced threat that can use legitimate software to compromise systems to steal information, leaving no trace to perform...

Latest news

- Advertisement -