CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Alicia Hope
Staff Correspondent at CPO Magazine
Alicia Hope has been a journalist for more than 5 years, reporting on technology, cyber security and data privacy news.


Police car with roof mounted strobe lightbar showing law enforcement data breach
Cyber SecurityNews

Data Breach on DEA Law Enforcement System Grants Cyber Criminals Access to 16 Databases

May 20, 2022
A data breach on DEA's Law enforcement system reportedly granted administrators of doxxing and swatting website Doxbin and linked to Lapsus$ hacking group access to at least 16 databases.
Read More
Network operations center showing cyber attacks on MSPs
Cyber SecurityNews

Five Eyes Alliance Warns of Cyber Attacks on MSPs and Potential Espionage and Ransomware Deployment

May 19, 2022
A multinational cybersecurity advisory warned that cyber attacks on managed service providers (MSPs) could enable supply chain attacks, ransomware, and cyber espionage downstream.
Read More
Mobile phone with hacked sign showing NCSC warning of malicious apps in app stores
Cyber SecurityNews

NCSC Warns About Malicious Apps on App Stores, Chief Backs New Consumer Regulations

May 17, 2022
The U.K’s National Cybersecurity Centre (NCSC) report addressed the threat posed by malicious apps downloaded through official and third-party app...
Read More
Hacker at desktop using laptop with emails in background showing Business Email Compromise BEC attacks
Cyber SecurityNews

FBI: Business Email Compromise Resulted in Losses of $43 Billion Since 2016; BEC Attacks Increased by 65% Between 2019 and 2021

May 16, 2022
The FBI calculated the cost of BEC attacks to be $43 billion, with a 65% increase between 2019 and 2021. Banks in Thailand, Hong Kong, China, and Singapore were the primary recipients of illicit funds.
Read More
NHS logo with heart silhouette showing email accounts used for phishing campaign
Cyber SecurityNews

Legitimate NHS Email Accounts Exploited in Credential Harvesting Phishing Campaign and Advance-Fee Scams

May 13, 2022
Threat actors leveraged 139 compromised NHS email accounts to send thousands of malicious emails in a credential harvesting phishing campaign and advance-fee scam.
Read More
Close-up NPM package showing malware
Cyber SecurityNews

Bug Allows Malware Authors To Add Reputable Contributors To Malicious NPM Packages Without Their Knowledge or Consent

May 10, 2022
Security researchers discovered a “package planting” flaw that allows malware developers to add respected open-source contributors to malicious NPM packages without notification or approval.
Read More
Woman CEO talking on video conference call
Cyber Security

Report finds only 3% of Cybersecurity Startups That Raised Venture Funding in 2020 and 2021 are Led by Female CEOs

May 7, 2022
A recent report investigated how much of that funding went to companies led by women. Of the 654 startups analyzed, only 22 — or 3.3% — were led by female CEOs.
Read More
Bug crawling on table showing privilege escalation vulnerability for Linux
Cyber SecurityNews

Microsoft Discovers Nimbuspwn Privilege Escalation Vulnerability on Linux Systems Granting Hackers Root Permissions

May 6, 2022
Microsoft 365 Defender researcher team discovered a privilege escalation vulnerability dubbed Nimbuspwn allowing an attacker to gain root privileges and deploy malicious payloads.
Read More
Hacker hand stealing data from laptop showing BlackCat ransomware
Cyber SecurityNews

FBI Alert Warns of BlackCat Ransomware That Compromised 60 Organizations in 4 Months

May 5, 2022
The FBI warned that BlackCat ransomware had compromised 60 organizations worldwide as of March 2022 and demanded millions in ransom payment. Alert linked BlackCat to the now-defunct BlackMatter ransomware group.
Read More
Man holding iPhone showing fraudster targeting Apple Pay
Cyber SecurityNews

Fraudster Reveals Apple Pay Is the “Easiest Way” To Make Money Bypassing Multifactor Authentication

May 3, 2022
Fraudster revealed how criminals make money using underground bots that steal multifactor authentication codes and link stolen cards to contactless payments like Apple Pay.
Read More
Load More

Latest

Police car with roof mounted strobe lightbar showing law enforcement data breach

Data Breach on DEA Law Enforcement System Grants Cyber Criminals Access to 16 Databases

VPN logo on smartphone lying on laptop showing VPN providers to hand over customer data

VPN Providers Ordered by Indian Government To Hold All Customer Data for Five Years, Hand Over to Government Upon Request

National Stadium and residential buildings with mountains in the background in San Jose, Costa Rica showing Conti ransomware

Could a Cyber Attack Overthrow a Government? Conti Ransomware Group Now Threatening To Topple Costa Rican Government if Ransom Not Paid

USA map on digital display showing privacy regulations

Data Privacy Conundrum: When Different States Play by Different Rules. . .

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results