New study suggests that a combination of broken and poorly configured SIEM rules are providing organizations with a far lower level of threat coverage than they believe they have.
SIM swap attack is on the rise which includes the recent Twitter hack on their CEO’s account. Attackers used social engineering to convince telco to switch target’s number to their own SIM cards.
A six-year surveillance operation tied to state-sponsored Iranian hackers appears to have scooped up personal documents and tracked the phone location data of dissidents.
The beleaguered cybersecurity teams of SMEs are being forced to become very creative in keeping up with modern threats, juggling a variety of outsourced solutions in the face of an onslaught of attacks.
Mercedes-Benz's source code leak for smart car components may have given software developers and hackers access to the German automaker's most lucrative intellectual assets.
Quantitative cybersecurity budgeting helps security professionals properly translate security risks into business risks and demonstrate how cyber risks impact the organization as a whole – which are key to getting buy-in from non-technical stakeholders.
Majority of SMBs still do not believe they will be likely targets of cyber attacks despite the fact that 60% of the companies go out of business within six months after suffering an attack.
Scammers have taken to social media networks as their favorite spot for phishing attacks as there are billions of registered users with a vast majority of them practicing little to no account security.
From the Capitol riot to squashing of Parler, clamping down on WeChat and TikTok to impact of the SolarWinds hack, these have been a whirlwind few months full of revelations.