Proposed Active Cyber Defense Bill “hack back” will allow victims of hacker attacks to carry out digital vigilantism but what are the consequences when companies take law into their own hands?
Cybereason recently exposed a multi-year cyber espionage operation carried out by Chinese hackers where they follow their targets moving from country to country by hopping from one breached network to another.
Cloud solution provider PCM claimed minimal impact to their customers even though recent breach of Office 365 administrative credentials could lead to exposure of personal data and sensitive business documents.
Despite the potential for visual hacking to take place in public, only 30% of business travelers say that their organizations have educated them on how to protect sensitive information.
Supply chain security is a hot issue for enterprises with increasing third party data breaches. Recent (ISC)² study indicates these breaches are more likely the fault of a large enterprise partner than a small one.
Russia has been making news for hacking utility systems in other nations and for a change, news has emerged that U.S. is conducting cyber attack on power grid in Russia by planting malicious code.
Medical companies affected by AMCA healthcare data breach have begun alerting investors and shareholders which may cause them to lose tens of millions of dollars in stock market valuation.
One key finding from CNCERT report shows most cyber attacks are using U.S. servers to implant viruses and carry out botnet attacks against Chinese computer assets.
Recent 2019 ISACA annual report shows key interesting cyber security trends which includes underreporting of cyber crimes and internal employees being the third-greatest security threat.