“Thunderspy” Attack Impacts Millions of Apple, Windows, Linux Machines
TheCISO -
Björn Ruytenberg, a researcher at Eindhoven University of Technology, discovered a security flaw in Intel's Thunderbolt ports, common to many laptops produced before 2019.
"If your computer...
How to protect your company from insider threats
Insider threat incidents have risen 44% over the past two years according to the 2022 Cost of Insider Threats: Global Report, with costs per...
Vulnerabilities Found in Top VPN Providers
TheCISO -
VPNPro researchers have discovered vulnerabilities in VPN providers: PrivateVPN and Betternet which can allow hackers to push fake updates and install malicious programs or...
Many Ways to Attack DNS Servers
The importance of the DNS service for the internet is widely understood. Most applications today rely on DNS to locate resources across the internet...
Only Half of Organizations Say Their Security Teams Are Prepared for CyberAttacks
TheCISO -
ISACA professionals responded to a recent survey on whether they are ready to detect and respond to the rising cybersecurity attacks during COVID-19.
ISACA surveyed...
New GIAC Cybersecurity Certification
TheCISO -
GIAC cybersecurity certifications are on the the most renowned in the world of Cybersecurity.
They have recently announced a new training program and certification called...
160,000 Nintendo Player Accounts Hacked
TheCISO -
WHAT KIND OF DATA WERE EXPOSED?
Recently a data breach of Nintendo systems exposed data of 160,000 people. The hackers exploited a weakness in the...
Docker Security Practices
Docker may be a new thing for many environments but it has been around long enough to be considered ready for production use. Like...
Warning to Apple Users! Possible Device Hack by Just Sending Email
TheCISO -
TWO CRITICAL FLAWS
According to cybersecurity researchers at ZecOps, bugs were found in the Apple mail app which can allow RCE (Remote Code Execution), due...
Zoom Videoconferencing Security Issues Were known to Dropbox
TheCISO -
Zoom videoconferencing has become the platform of choice in the midst of the COVID-19 lockdown. Security vulnerabilities have been unveiled that could allow attackers...
Defense in Depth – The Layered Approach to Cybersecurity
Defense In Depth is a common terminology in modern-day cybersecurity practices. It is a strategy that employs a series of mechanisms, also known as...
Microsoft Offers Free Cybersecurity Service Protection to Healthcare Staff
TheCISO -
Recently numerous hospitals became the target of cyber attacks both in Europe and the United States. Microsoft decided to offer its security service AccountGuard...