The Persisting Risks Posed by Legacy Medical DevicesLegislation requiring vendors to design cybersecurity into their medical devices is a great first step to help healthcare entities,...
Month: January 2023
Live Webinar | You Don’t Know Your Environment – and IT Doesn’t Either
Live Webinar | You Don't Know Your Environment - and IT Doesn't EitherPost ContentRead MoreDataBreachToday.com RSS Syndication
LIVE Webinar | Where Did the Hackers Go? They Ran(somware): Insights into Ransomware Recovery
LIVE Webinar | Where Did the Hackers Go? They Ran(somware): Insights into Ransomware RecoveryPost ContentRead MoreDataBreachToday.com RSS Syndication
Live Webinar | Mastering Vendor Risk Management: Key Insights For Building a Scalable Program
Live Webinar | Mastering Vendor Risk Management: Key Insights For Building a Scalable ProgramPost ContentRead MoreDataBreachToday.com RSS Syndication
Live Webinar: Don’t Let DLP and Compliance Programs Fail – Here’s How!
Live Webinar: Don’t Let DLP and Compliance Programs Fail – Here’s How!Post ContentRead MoreDataBreachToday.com RSS Syndication
Russian Nuisance Hacking Group KillNet Targets Germany
Russian Nuisance Hacking Group KillNet Targets GermanyBerlin Pledges Leopard 2 Tanks for Ukraine, Provoking Passing DDoS AttacksA pro-Kremlin hacking group with a history of launching distributed...
Entity Will Pay $4.3 Million Settlement in 2nd Big Hack Case
Entity Will Pay $4.3 Million Settlement in 2nd Big Hack CaseDeal to End Lawsuit in 2021 Breach Follows a $4.2 Million Settlement in a 2019 HackA...
European IoT Manufacturers Lag in Vulnerability Disclosure
European IoT Manufacturers Lag in Vulnerability DisclosureResearch Firm CEO Says IoT Makers Treat Cybersecurity as Somebody Else's ProblemA review of internet of things manufacturers by Copper...
Coinbase Fined 3.3 Million Euros by Dutch Central Bank
Coinbase Fined 3.3 Million Euros by Dutch Central BankCompany Delayed Registering as a Money Transmitter, Say BankersThe Dutch central bank fined Coinbase 3.3 million euros, saying...
Agencias federales de EE.UU. son víctimas de un ataque cibernético que utiliza software RMM legítimo
Agencias federales de EE.UU. son víctimas de un ataque cibernético que utiliza software RMM legítimoAl menos dos agencias federales en los EE. UU. fueron víctimas de...
¡Cuidado! Descubren nueva variante de malware PlugX que se propaga a través de dispositivos USB extraíbles
¡Cuidado! Descubren nueva variante de malware PlugX que se propaga a través de dispositivos USB extraíblesLos investigadores de seguridad cibernética han descubierto una muestra de PlugX...
Recent rise in SEO poisoning attacks compromise brand reputations
Recent rise in SEO poisoning attacks compromise brand reputationsA new research report from SentinelOne exposes a SEO poisoning attack campaign that hijacks brand names in paid...
10 data privacy tips to protect your organization this year
10 data privacy tips to protect your organization this yearIt’s data privacy week! This week-long international initiative was developed by the National Cybersecurity Alliance, and encourages...
Account takeovers increasing and diversifying – but there’s a solution
Account takeovers increasing and diversifying – but there’s a solutionIn this exclusive Cyber Talk article, CEO of SEON, Tamas Kadar, shares insights into the newest fraud...
How hackers stole the personal data of 37 million T-Mobile customers
How hackers stole the personal data of 37 million T-Mobile customersThe criminals took advantage of an API to grab personal details such as customer names, billing...
The risks of 5G security
The risks of 5G securityUnless you've been living under a rock for the past decade, you’ve probably heard of 5G telecommunications. But what is it? The...
Eye-opening data privacy trends and statistics (2023 and beyond)
Eye-opening data privacy trends and statistics (2023 and beyond)EXECUTIVE SUMMARY: Data is one of the most important and valuable assets for businesses. It functions as a...
How a fast-changing threat landscape catalyzed a cyber pandemic
How a fast-changing threat landscape catalyzed a cyber pandemicIn this edited interview excerpt from a Nasdaq TradeTalk, Check Point CEO Gil Shwed discusses artificial intelligence, the...
Learn cutting-edge ethical hacking techniques for just $39.99
Learn cutting-edge ethical hacking techniques for just $39.99The 2023 Masters in Cyber Security Certification Bundle includes full online training prep for key cybersecurity exams. The post...
A step-by-step guide: How to create a data collection policy
A step-by-step guide: How to create a data collection policyEXECUTIVE SUMMARY: Data is the new gold. Nearly everyone has clicked ‘accept’ on cookie tracking pop-ups without...
Survey: Cybersecurity budgets aren’t matching cybersecurity challenges
Survey: Cybersecurity budgets aren’t matching cybersecurity challengesA new study finds that due to the growing threat surface from hybrid work and third-party vendors, only half of...
AI + ChatGPT applied to mainstream, hybrid meetings
AI + ChatGPT applied to mainstream, hybrid meetingsDavid Shim is the Co-Founder and CEO of Read AI, which combines AI and analytics to make hybrid meetings...
How to force Portainer to use HTTPS and upload your SSL certificates for heightened security
How to force Portainer to use HTTPS and upload your SSL certificates for heightened securityIf Portainer is your go-to GUI for Docker and Kubernetes, you should...
Securing IoT with Microsoft Defender for IoT sensors
Securing IoT with Microsoft Defender for IoT sensorsProtecting the devices that run your production facilities is increasingly important. How can we secure single-purpose hardware? The post...
Enterprises Don’t Know What to Buy for Responsible AI
Enterprises Don't Know What to Buy for Responsible AIOrganizations are struggling to procure appropriate technical tools to address responsible AI, such as consistent bias detection in...
Here’s how IT budgets should fill cybersecurity moats in 2023
Here’s how IT budgets should fill cybersecurity moats in 2023TechRepublic speaks with Carlos Morales of Neustar Security Services on the best ways for companies to spend...
Massive Microsoft 365 outage caused by WAN router IP change
Massive Microsoft 365 outage caused by WAN router IP changeMicrosoft says this week's five-hour-long Microsoft 365 worldwide outage was caused by a router IP address change...
The top XDR investment decisions for CISOs
The top XDR investment decisions for CISOsThis Cyber Security Hub report shows how CISOs' uses managed services and XDR to detect threat and prevention of cyber...
How to use Microsoft KQL for SIEM insight
How to use Microsoft KQL for SIEM insightMicrosoft’s cloud-hosted SIEM software comes with a suite of powerful analytics tools designed to read logs and find anomalies...
Threat actors lure phishing victims with phony salary bumps, bonuses
Threat actors lure phishing victims with phony salary bumps, bonusesContenido de la entradaLeer másProofpoint News Feed

























