CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Hacker using mobile smartphone calling victim showing remote monitoring and management software used in phishing of federal agencies
Cyber SecurityNews

Hackers Breached Multiple Federal Agencies via Remote Monitoring and Management Software

February 2, 2023
A joint cybersecurity alert warned that hackers breached multiple federal agencies via remote monitoring and management software in a widespread helpdesk-themed phishing campaign.
Read More
Taylor Swift on stage showing bot attack on Ticketmaster
Cyber SecurityNews

Ticketmaster Says Bot Attack Is To Blame for the Misfortunes of Taylor Swift Fans

February 2, 2023
Ticketmaster executives have been brought in front of a Senate Judiciary Committee and claims now that a bot army were both purchasing tickets and attempting to breach the servers simultaneously.
Read More
Airline passengers in an international airport showing no fly list in data leak
Cyber SecurityNews

Wanted Hacker Accessed Federal No Fly List on an Unsecured Airline’s Server

January 31, 2023
A wanted Swiss hacker accessed a federal No Fly List containing millions of records that was sitting on an unsecured server operated by a regional airline company.
Read More
Yellow crime scene tape on computer keyboard showing law enforcement operations on Hive ransomware gang
Cyber SecurityNews

Hive Ransomware Shut Down by Law Enforcement Operation; FBI in Possession of Decryption Keys, Group’s Public-Facing Website

January 31, 2023
The Hive ransomware threat appears to be very much in retreat as the US Department of Justice recently announced the seizure of the group's decryption keys and infrastructure, including its public-facing website, by law enforcement operations.
Read More
League of Legends website page showing security breach of game cheats and source code
Cyber SecurityNews

Security Breach at Riot Games Reveals Game Cheats, Source Code for Popular eSport “League of Legends”

January 30, 2023
Hackers exfiltrated not just internal game cheats, but the source code that underpins this system for certain Riot Games titles, including League of Legends. This creates the possibility of new game cheats and exploits being developed.
Read More
African woman raising hand to ask question at team security awareness training
Cyber SecurityInsights

7 Tips for Launching a Security Awareness Training Program

January 30, 2023
Not all security awareness training programs achieve desired results. Here are items to consider when setting up your security awareness training program.
Read More
KFC Drive thru at night showing ransomware attack
Cyber SecurityNews

KFC, Pizza Hut, and Taco Bell Ransomware Attack Shuts Down 300 Restaurants in the UK

January 27, 2023
A ransomware attack on KFC, Pizza Hut, and Taco Bell parent company Yum! Brands shut down 300 restaurants in the United Kingdom and leaked the company's corporate data.
Read More
Exterior of T-Mobile store showing data breach
Cyber SecurityNews

T-Mobile Data Breach: Hacker Accessed Personal Details of 37 Million Subscribers

January 27, 2023
T-Mobile has begun notifying 37 million prepaid and post subscribers whose personal information was accessed by unauthorized bad actors in an unsecured API data breach.
Read More
Developer working on laptop showing software supply chain attacks
Cyber SecurityInsights

Why Securing Software Should Go Far Beyond Trusting Your Vendors

January 27, 2023
Software supply chain attacks are among the most destructive strategies used by cybercriminals today. 59% of companies that have suffered a supply chain attack reported significant operational disruption, according to BlackBerry research.
Read More
Lock on hard disk showing encryption key stolen for encrypted backups
Cyber SecurityNews

Encrypted Backups, Encryption Key Stolen From GoTo in Hack

January 27, 2023
GoTo says that the stolen information varies by product, but encryption keys that were also taken in the hack will grant access to "a portion" of the encrypted backups that were stolen.
Read More
1 2 3 … 200

Latest

Hacker using mobile smartphone calling victim showing remote monitoring and management software used in phishing of federal agencies

Hackers Breached Multiple Federal Agencies via Remote Monitoring and Management Software

Taylor Swift on stage showing bot attack on Ticketmaster

Ticketmaster Says Bot Attack Is To Blame for the Misfortunes of Taylor Swift Fans

Man check mark on document showing privacy notices and consent forms

Privacy Notices and Consent Forms: Why, Even Though They Are Unwieldy, They Will Most Likely Stay With Us in the Years To Come

Chick-fil-A restaurant showing privacy lawsuit over data collection

Chick-fil-A Hit With Privacy Lawsuit Over Data Collection Embedded in Viral Video Marketing Campaign

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Facebook
See all results