CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Hand inserting dollar bills in Bitcoin ATM showing crypto theft
Cyber SecurityNews

Bitcoin ATMs Hacked, Millions in Crypto Stolen as Threat Actors Exploit an Upload Vulnerability

March 28, 2023
The final amount of stolen crypto is still being tallied as investigations continue, but about 56 BTC (about $1.5 million) has been confirmed to be lost. General Bytes has over 15,000 bitcoin ATMs in circulation in over 100 countries.
Read More
Chinese national flag on circuit board showing Chinese hackers cyber attacks
Cyber SecurityNews

Chinese Hackers Targeting Outer Layers of Networks for Cyber Attacks, Using New Malware for “Multi-Year” Intrusions

March 27, 2023
Chinese hackers are now focusing on the outer layers of target networks, even antivirus software and firewalls, as an entry point for stealthy cyber attacks that can last for years.
Read More
Cloud computing technology with lock showing API security for cloud apps
Cyber SecurityInsights

Why API Security Should Be Your First Step in Protecting Your Cloud Apps

March 27, 2023
With the increasing adoption of cloud computing, the usage of APIs has grown exponentially, making API security a top priority for organizations that want to protect their cloud-based applications.
Read More
Arrested hacker in handcuffs showing hacking forum operator charged with cybercrime
Cyber SecurityNews

Hacking Forum “BreachForums” Alleged Owner Pompompurin Arrested and Charged With Cybercrime

March 24, 2023
The FBI arrested and charged a New York man Connor Brian Fitzpatrick with cybercrime. Connor is alleged to be the hacking forum “BreachForums” owner and operator, Pompompurin.
Read More
Shopper using laptop showing ecommerce fraud for online brands
Cyber SecurityInsights

Online Brands: Keep Your Friends Close, and Fraud Even Closer

March 24, 2023
Advanced digital tools, readily available information, and new ways to buy online, unfortunately, has altered the ecommerce fraud landscape into a widely accessible territory for criminals to explore.
Read More
Pinduoduo logo on tablet showing Chinese shopping app with malware
Cyber SecurityNews

Chinese Shopping App Pinduoduo Blocked by Google Over Signs of Malware in Its Code

March 23, 2023
Pinduoduo, a popular Chinese shopping app has been suspended from the Google Play Store after traces of malware were found in the code of previous app versions. Suspected purpose was to pore through user data and find information related to competing shopping apps.
Read More
hacker hand reaching out on laptop showing data breach of service providers
Cyber SecurityNews

Latitude Financial Services Data Breach Leaked Customer Data From Two Service Providers

March 23, 2023
Australia’s Latitude Financial Services is investigating a data breach that impacted two third-party service providers, exposing hundreds of thousands of customer records.
Read More
Stack of 100 US dollars showing White House budget for cybersecurity spending
Cyber SecurityNews

White House Budget for 2024 Cybersecurity Spending: More Funding for CISA, Modernization of Online Government Services

March 22, 2023
The White House budget is seeking a $145 million increase in cybersecurity spending for CISA, $245 million for training cybersecurity professionals in the energy sector, $63 million for the FBI's cyber investigations division, and $215 million for the Treasury Department to implement zero trust architecture and generally bolster its cyber defenses.
Read More
Hand in a glove on a laptop keyboard and a medical stethoscope showing healthcare provider data breach
Cyber SecurityNews

Massive Data Breach at Healthcare Provider ILS Compromises Millions of Patients

March 22, 2023
Miami-based healthcare provider Independent Living Systems suffered a data breach that exposed the personal and protected health information of over 4 million customers.
Read More
Man using laptop with ChatGPT showing AI and cyber threats
Cyber SecurityNews

Can Security Keep Up With ChatGPT Evolutions?

March 22, 2023
As with most technological developments, there are two sides of the coin. ChatGPT may present businesses with a never-ending pool of opportunities, but the same resource can be exploited to help criminals infiltrate systems more effectively.
Read More
1 2 3 … 207

Latest

Hand inserting dollar bills in Bitcoin ATM showing crypto theft

Bitcoin ATMs Hacked, Millions in Crypto Stolen as Threat Actors Exploit an Upload Vulnerability

Webpage of ChatGPT showing chat histories exposed by ChatGPT bug

Titles of User Chat Histories Exposed by ChatGPT Bug

Chinese national flag on circuit board showing Chinese hackers cyber attacks

Chinese Hackers Targeting Outer Layers of Networks for Cyber Attacks, Using New Malware for “Multi-Year” Intrusions

Cloud computing technology with lock showing API security for cloud apps

Why API Security Should Be Your First Step in Protecting Your Cloud Apps

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results