Browsing Category
Cybersecurity
Remcos Trojan Returns to Most Wanted Malware List After Ukraine Attacks
The Remcos Trojan has returned to the top ten list (in eighth position) of most wanted malware by Check Point Software for the…
8220 Gang Behind ScrubCrypt Attack Targeting Oracle Weblogic Server
The threat actor known as “8220 Gang” has been associated with a new payload targeting an exploitable Oracle Weblogic Server in a…
Acer Confirms Unauthorized Access But Says No Consumer Data Stolen
Taiwanese electronics manufacturer Acer has confirmed an accident of unauthorized access to one of its document servers for…
TikTok Initiates Project Clover Amid European Data Security Concerns
As government bodies across the globe have sought to ban TikTok on official devices over data security concerns, the social media…
How Zero Trust Enables More Effective Security Management
Moving to Zero Trust Architecture as a standard
By Jim Hietala, Vice President of Business Development and Security at The Open…
Understanding the Shared Responsibility Model, Critical Step to Ensure…
Multi-cloud adoption is at an all-time high. While cybersecurity company Fortinet estimated in 2021 that 76% of organizations were…
Tehran Targets Female Activists in Espionage Campaign
Security researchers have uncovered a new Iranian state-backed cyber-espionage campaign aimed at rooting out female human rights…
House Members at Risk After Insurer Data Breach
Hundreds of House of Representative members and staffers may have had insurance and personally identifiable information (PII)…
Fifth of Government Workers Don’t Care if Employer is Hacked
A culture of unaccountability, poor cyber-hygiene and limited staff training are creating a perfect storm of cyber-risk for…
US RESTRICT Act Gains Supports, Empowers Biden to Ban Foreign Tech
The White House and a bipartisan group of 12 senators have endorsed the Risk Information and Communications Technology (RESTRICT)…