Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of ChargeThe use of software as a service (SaaS) is experiencing rapid growth and...
Day: January 28, 2023
Microsoft Urges Customers to Secure On-Premises Exchange Servers
Microsoft Urges Customers to Secure On-Premises Exchange ServersMicrosoft is urging customers to keep their Exchange servers updated as well as take steps to bolster the environment,...
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Federal Agencies Infested by Cyberattackers via Legit Remote Management SystemsHackers don't need a key to get past your defenses if they can essentially teleport using RMMs,...
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Federal Agencies Infested by Cyberattackers via Legit Remote Management SystemsHackers don't need a key to get past your defenses if they can essentially teleport using RMMs,...
Ransomware Profits Dip as Fewer Victims Pay Extortion
Ransomware Profits Dip as Fewer Victims Pay ExtortionAs Funding From Ransoms Goes Down, Gangs Embrace Re-Extortion, Researchers WarnBad news for ransomware groups: Experts find it's getting...
What Makes Sumo Logic an Appealing Target for Private Equity
What Makes Sumo Logic an Appealing Target for Private EquitySumo Logic Is a Well-Regarded SIEM Provider, But Profitability Remains ElusiveThoma Bravo, Vista Equity Partners and rival...
Why Healthcare Orgs Must Prioritize 3rd-Party Risk Management
Why Healthcare Orgs Must Prioritize 3rd-Party Risk ManagementVenminder CEO James Hyde on Reducing Risk Exposure From Vendor RelationshipsWith breaches on the rise and the average cost...
Targets of Opportunity: How Ransomware Groups Find Victims
Targets of Opportunity: How Ransomware Groups Find VictimsWhile Some Sectors Are More Prized Than Others, Profits Trump All ConsiderationsAs ransomware continues to pummel numerous sectors, and...
Securing the SaaS Layer
Securing the SaaS LayerIn this episode of "Cybersecurity Unplugged," Galit Lubetzky Sharon, CTO of Wing Security, discusses the challenge of securing SaaS applications, which are decentralized...
David Derigiotis on the Complex World of Cyber Insurance
David Derigiotis on the Complex World of Cyber InsuranceIn this episode of "Cybersecurity Unplugged," David Derigiotis of insurtech Embroker discusses the complex world of cyber liability...
Protecting the Hidden Layer in Neural Networks
Protecting the Hidden Layer in Neural NetworksIn this episode of "Cybersecurity Unplugged," Chris "Tito" Sestito discusses technology to protect neural networks and artificial intelligence and machine-learning...
The Persisting Risks Posed by Legacy Medical Devices
The Persisting Risks Posed by Legacy Medical DevicesLegislation requiring vendors to design cybersecurity into their medical devices is a great first step to help healthcare entities,...
Live Webinar | You Don’t Know Your Environment – and IT Doesn’t Either
Live Webinar | You Don't Know Your Environment - and IT Doesn't EitherPost ContentRead MoreDataBreachToday.com RSS Syndication
LIVE Webinar | Where Did the Hackers Go? They Ran(somware): Insights into Ransomware Recovery
LIVE Webinar | Where Did the Hackers Go? They Ran(somware): Insights into Ransomware RecoveryPost ContentRead MoreDataBreachToday.com RSS Syndication
Live Webinar | Mastering Vendor Risk Management: Key Insights For Building a Scalable Program
Live Webinar | Mastering Vendor Risk Management: Key Insights For Building a Scalable ProgramPost ContentRead MoreDataBreachToday.com RSS Syndication
Live Webinar: Don’t Let DLP and Compliance Programs Fail – Here’s How!
Live Webinar: Don’t Let DLP and Compliance Programs Fail – Here’s How!Post ContentRead MoreDataBreachToday.com RSS Syndication
Russian Nuisance Hacking Group KillNet Targets Germany
Russian Nuisance Hacking Group KillNet Targets GermanyBerlin Pledges Leopard 2 Tanks for Ukraine, Provoking Passing DDoS AttacksA pro-Kremlin hacking group with a history of launching distributed...
Entity Will Pay $4.3 Million Settlement in 2nd Big Hack Case
Entity Will Pay $4.3 Million Settlement in 2nd Big Hack CaseDeal to End Lawsuit in 2021 Breach Follows a $4.2 Million Settlement in a 2019 HackA...
European IoT Manufacturers Lag in Vulnerability Disclosure
European IoT Manufacturers Lag in Vulnerability DisclosureResearch Firm CEO Says IoT Makers Treat Cybersecurity as Somebody Else's ProblemA review of internet of things manufacturers by Copper...
Coinbase Fined 3.3 Million Euros by Dutch Central Bank
Coinbase Fined 3.3 Million Euros by Dutch Central BankCompany Delayed Registering as a Money Transmitter, Say BankersThe Dutch central bank fined Coinbase 3.3 million euros, saying...
Agencias federales de EE.UU. son víctimas de un ataque cibernético que utiliza software RMM legítimo
Agencias federales de EE.UU. son víctimas de un ataque cibernético que utiliza software RMM legítimoAl menos dos agencias federales en los EE. UU. fueron víctimas de...
¡Cuidado! Descubren nueva variante de malware PlugX que se propaga a través de dispositivos USB extraíbles
¡Cuidado! Descubren nueva variante de malware PlugX que se propaga a través de dispositivos USB extraíblesLos investigadores de seguridad cibernética han descubierto una muestra de PlugX...
Recent rise in SEO poisoning attacks compromise brand reputations
Recent rise in SEO poisoning attacks compromise brand reputationsA new research report from SentinelOne exposes a SEO poisoning attack campaign that hijacks brand names in paid...
10 data privacy tips to protect your organization this year
10 data privacy tips to protect your organization this yearIt’s data privacy week! This week-long international initiative was developed by the National Cybersecurity Alliance, and encourages...
Account takeovers increasing and diversifying – but there’s a solution
Account takeovers increasing and diversifying – but there’s a solutionIn this exclusive Cyber Talk article, CEO of SEON, Tamas Kadar, shares insights into the newest fraud...
How hackers stole the personal data of 37 million T-Mobile customers
How hackers stole the personal data of 37 million T-Mobile customersThe criminals took advantage of an API to grab personal details such as customer names, billing...
The risks of 5G security
The risks of 5G securityUnless you've been living under a rock for the past decade, you’ve probably heard of 5G telecommunications. But what is it? The...
Eye-opening data privacy trends and statistics (2023 and beyond)
Eye-opening data privacy trends and statistics (2023 and beyond)EXECUTIVE SUMMARY: Data is one of the most important and valuable assets for businesses. It functions as a...
How a fast-changing threat landscape catalyzed a cyber pandemic
How a fast-changing threat landscape catalyzed a cyber pandemicIn this edited interview excerpt from a Nasdaq TradeTalk, Check Point CEO Gil Shwed discusses artificial intelligence, the...
Learn cutting-edge ethical hacking techniques for just $39.99
Learn cutting-edge ethical hacking techniques for just $39.99The 2023 Masters in Cyber Security Certification Bundle includes full online training prep for key cybersecurity exams. The post...