CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Yodel delivery Service logo sign showing cyber incident suspected ransomware
Cyber SecurityNews

Yodel Parcel Delivery Service Disrupted by a Suspected Ransomware Cyber Incident

July 1, 2022
Yodel parcel delivery service confirmed that it suffered a cyber incident that disrupted distribution operations leaving customers unable to track orders or reach customer support.
Read More
Hacker exploit vulnerability Log4Shell on VMware servers
Cyber SecurityNews

CISA and Coast Guard Cyber Command Warn About Hackers Leveraging Log4Shell Vulnerability on VMware Servers

July 1, 2022
Threat actors exploited Log4Shell vulnerability on unpatched VMware servers to gain access, move laterally, deploy malware, and exfiltrate sensitive information.
Read More
Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks
Cyber SecurityNews

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

June 30, 2022
The Russian hackers call themselves "Killnet" and first made the news in April with declarations of intent to conduct cyber attacks on critical infrastructure in other countries. The group has been linked to prior DDoS campaigns.
Read More
Harmony cryptocurrency coin on colorful background showing crypto hack of blockchain bridge
Cyber SecurityNews

Horizon Blockchain Bridge Latest Crypto Hack Victim, $100 Million Stolen

June 30, 2022
Blockchain bridge was hit for about $100 million in crypto hack as attackers potentially exploited a signature vulnerability that security researchers had been warning about on Twitter for months.
Read More
Aerial view of oil refinery plant showing critical infrastructure cyber defense
Cyber SecurityInsights

Why Investments in Better Infrastructure Cyber Defense Are Just a Start

June 30, 2022
While cyber defense efforts like those backed by DoE are clearly a net positive for the nation, the prospective contributions of these and other efforts must be tempered by both practical assessment of the strategic context of foreign critical infrastructure attacks.
Read More
Hacker hand stealing data from laptop at night showing data breach
Cyber SecurityNews

Flagstar Bank Data Breach Leaked Sensitive Information of 1.5 Million Customers

June 29, 2022
Threat actors accessed personally identifiable information (PII) and Social Security numbers of more than 1.5 million customers in the Flagstar Bank data breach.
Read More
Computer system hack warning on screen showing Conti ransomware attacks
Cyber SecurityNews

Conti Rampage of Ransomware Attacks Comes Into Focus: 40 Companies Hit in One Month, 850 in Two Years

June 28, 2022
Conti is able to breeze through ransomware attacks in as little as three days thanks to a polished setup that has been years in the making: custom ransomware and tools, a disciplined working schedule and a business-like structure.
Read More
C-Suite businessman calling on personal device showing security and privacy issues
Cyber SecurityNews

New Security and Privacy Study Finds C-Suite Personal Devices Are Largely Unprotected, 1 Out of 4 Already Have Malware

June 28, 2022
The study draws on a sample of over 1,000 C-Suite and board members and analyzed their personal devices and home network security and privacy. 87% of executive devices have no security measures at all installed.
Read More
Brown envelope and USB flash memory drive showing cyber physical threat
Cyber SecurityInsights

How CSOs and CISOs Can Bridge the Gap Between Physical and Cybersecurity

June 28, 2022
As the world becomes more digitally integrated, hacker groups will continue to take advantage of the physical blindspot that many companies have to launch attacks against digital infrastructure. A cyberthreat that comes by way of a physical device is known as a “phygital” threat.
Read More
Automobile production line showing OT devices vulnerabilities for industrial control systems
Cyber SecurityNews

Warning for Industrial Control Systems: Research Discovers 56 “Insecure by Design” Vulnerabilities in Two Dozen OT Devices

June 27, 2022
Exploitable features are the favored means by which to penetrate OT devices, and the current research finds that they continue to be an issue in industrial control systems.
Read More
1 2 3 … 165

Latest

Yodel delivery Service logo sign showing cyber incident suspected ransomware

Yodel Parcel Delivery Service Disrupted by a Suspected Ransomware Cyber Incident

Hacker exploit vulnerability Log4Shell on VMware servers

CISA and Coast Guard Cyber Command Warn About Hackers Leveraging Log4Shell Vulnerability on VMware Servers

Finger pointing at digital lock showing privacy enhancing technologies (PETs)

What Are Privacy-Enhancing Technologies (PETs) And How You Can Choose the Right One(s)

Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results