CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Alicia Hope
Staff Correspondent at CPO Magazine
Alicia Hope has been a journalist for more than 5 years, reporting on technology, cyber security and data privacy news.


A Macbook Pro keyboard showing problem with macOS malware
Cyber SecurityNews

macOS Malware Silver Sparrow Affects About 40,000 Macs Running Both Intel and ARM Chips

March 4, 2021
Red Canary researchers said Silver Sparrow macOS malware infecting about 40,000 Macs using both Intel and ARM chips could deliver malicious payloads at a moment's notice. Read More
Lawyer, attorney with gavel working in the office showing third party data breach on Jones Day
Cyber SecurityNews

Jones Day Law Firm Associated With Donald Trump Leaks Confidential Client Information in a Third-Party Data Breach

March 1, 2021
Law firm associated with Donald Trump and half of Fortune 500 companies leaked 100 GB of confidential client information in a third-party data breach linked to Clop ransomware. Read More
KIA logo on a bumper of new car in showroom showing impact of DoppelPaymer ransomware attack
Cyber SecurityNews

Kia Motors America Suffers a $20 Million Suspected DoppelPaymer Ransomware Attack

February 26, 2021
Kia Motors America suffered a suspected DoppelPaymer ransomware attack that shut down internal and customer-facing systems. Hackers demanded 404 Bitcoins worth about $20 million. Read More
SHAREit app with magnifying on smartphone screen showing file-sharing app security flaw
Cyber SecurityNews

SHAREit Android File-Sharing App Security Flaw Exposes Users to Remote Code Execution and Sensitive Data Leaks

February 25, 2021
Popular Android file-sharing app SHAREit with over a billion downloads has a security flaw that could leak users’ sensitive information and allow remote code execution. Read More
Hacker using laptop with interface of users and locks showing credential stuff attack
Cyber SecurityNews

Report Found That Credential Spilling Doubled Within Four Years, Credential Stuffing Attacks Now Preferred Intrusion Method

February 22, 2021
F5 Credential Stuffing Report found that credential spills doubled between 2016 and 2020 while credential stuffing became the preferred attack method. Read More
Access window with login and password on virtual screen showing password reuse of employee credentials
Cyber SecurityNews

About 26 Million Fortune 1000 Employee Credentials Available on the Dark Web, Password Reuse Rampant

February 19, 2021
SpyCloud found about 26 million Fortune 1000 employee credentials circulating on the dark web. Password reuse, weak passwords, and infostealers were responsible for the leaks. Read More
Developer sitting comfy holding hands behind head looking many monitors showing mock supply chain attack
Cyber SecurityNews

Researcher Hacks 35 Major Companies In A Mock Supply Chain Attack

February 18, 2021
The supply chain attack method leverages commonly-used dependency managers and private or non-existent dependencies to install malicious code and backdoors in internal applications. Read More
Business man tied up with rope screaming for help showing threat of ransomware attacks
Cyber SecurityNews

UK National Cyber Security Center Warns of Increased Threat of Ransomware Attacks, Some Victims Hit Multiple Times

February 15, 2021
UK's NCSC issued an alert over the growing risk of ransomware attacks as threat actors diversified attack vectors and monetization methods, with some victims hit by repeat attacks shortly after paying a ransom. Read More
Worried woman with mask groceries shopping in supermarket looking at empty wallet showing identity theft during pandemic
Cyber SecurityNews

Identity Theft Doubled During the Pandemic as Fraudsters Targeted COVID-19 Relief Payments

February 12, 2021
The FTC reported that identity theft doubled during the pandemic as scammers targeted COVID-19 relief payments to individuals and government-sponsored loans for small businesses. Read More
Close-up of a black keyboard showing Chinese hackers SolarWinds hack
Cyber SecurityNews

Suspected Chinese Hackers Exploit a Different SolarWinds Hack To Compromise USDA’s National Finance Center

February 11, 2021
Suspected Chinese hackers exploited a second SolarWinds hack to compromise the National Finance Center, which processes salaries for agencies including the FBI and the DHS. Read More
Load More

Latest

Retro robots watch bots on TV showing increase in marketing fraud

The Growing Problem of Marketing Fraud: Bots Pose as Legitimate Internet Users to Fake Traffic, Milk Digital Advertising Services

Padlock on keyboard showing importance of CMMC framework for cybersecurity and data privacy

Reflecting Back on Data Privacy Day 2021: Why This Day Mattered More Than Ever Before

A Macbook Pro keyboard showing problem with macOS malware

macOS Malware Silver Sparrow Affects About 40,000 Macs Running Both Intel and ARM Chips

New York financial district cityscape showing new cyber defense report

New York Cyber Task Force Report Identifies Near-Term Cyber Defense Challenges, Calls for Increased Government and Private Industry Collaboration

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Regulations Data Breach EU GDPR Cyber Threat
See all results