Browsing Category
Cybersecurity
Application Modernization and Other Best Practices of Securing Legacy…
By Roman Davydov, Technology Observer, Itransition
Legacy systems continue to play a vital role in the operations of many…
Cyber-attack Response Takes More than Two Working Days
Organizations around the world take on average more than two business days to respond to a cyber-attack, according to new research…
Dutch police warn customers of a popular DDoS booter service
Dutch police warn customers of a distributed denial-of-service (DDoS) website of stopping using the service to avoid…
Researchers Condemn Apple’s Proposed Phone-Scanning Features
Apple's plans to implement new phone-scanning features have been heavily criticized by more than a dozen cybersecurity experts.…
Data Stolen from American Osteopath Group
The personal data of thousands of individuals have been stolen from a non-profit professional membership organization located in…
Google Sends Customers 50,000+ Warnings of State-Backed Attacks
Google has seen a 33% year-on-year spike in nation state attempts to compromise its customers so far in 2021, the tech giant…
Being Mindful of Communication Security
The potential risks of communication APIs and CPaaS and secure vendor selection criteria.
By James Ryan, Director of…
US Government Warns of Insider and Ransomware Threat to Water Plants
The US authorities have issued an alert warning of ongoing malicious cyber-activity targeting the country’s water and wastewater…
Missouri Governor Slammed for Vow to Prosecute Researcher
Missouri governor Mike Parson has been widely criticized for seeking to prosecute news reporters who disclosed a vulnerability on…
Olympus Investigates Potential Cyber-attack – Infosecurity Magazine
Olympus has launched an investigation after detecting a potential cybersecurity incident in part of its IT system.
The…