CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Microsoft logo above its headquarters showing leaked credentials by Microsoft Exchange protocol
Cyber SecurityNews

Microsoft Exchange Server’s Autodiscover Feature Leaked Credentials of Over 100,000 Users To Third-Party Untrusted Domains

September 30, 2021
Guardicore discovered that the Microsoft Exchange server’s Autodiscover feature design flaw leaked credentials of 100,000 users by trying to authenticate on untrusted third-party servers.
Read More
Stock exchange chart with oscillators and indicators showing DDoS cyber attack on New Zealand Stock Exchange
Cyber SecurityNews

New Zealand Stock Exchange Shut Down by DDoS Cyber Attack

September 3, 2020
New Zealand’s Stock Exchange was crippled by a DDoS cyber attack, lasting four days and forcing the government to activate the National Security System requiring government agencies to work together.
Read More
Hand holding a smart phone with new General Motors logo on screen showing credential stuffing attack
Cyber SecurityNews

Hackers Accessed Car Owners’ Personal Information in General Motors Credential Stuffing Attack

June 2, 2022
Threat actors compromised American automaker General Motors in a credential stuffing attack, accessed customers' personal information, and redeemed reward points for gift cards.
Read More
Woman using Twitter on smartphone showing issue with exposed data for business advertisers
Cyber SecurityNews

Twitter Exposed Data Belonging to Advertisers Through the Web App

July 3, 2020
Business users' billing information was inadvertently stored in the browser's cache, making it possible for the exposed data to be accessed by users who share computers.
Read More
Night view of refinery plant showing the importance of ICS security to prevent cyber attacks on critical infrastructure
Cyber SecurityInsights

The Invisible Attackers Waiting at Your Industrial Systems Gate: Be Wary, Be Prepared, Stay Resilient

July 8, 2020
Without a pragmatic approach to ICS security, businesses could face serious consequences and shutdown of production when vulnerabilities are exploited by threat actors.
Read More
High voltage towers with electric power lines at sunrise showing cyber attack at energy company
Cyber SecurityNews

Colorado Energy Company Suffered a Cyber Attack Destroying 25 Years of Data and Shut Down Internal Controls

December 10, 2021
Colorado Energy Company, Delta-Montrose Electric Association (DMEA), suffered a malicious cyber attack that shut down 90% of its internal controls and wiped 25 years of historical data.
Read More
Hackers breaking server using computer showing cyber attacks on critical infrastructure
Cyber SecurityNews

Talks on Critical Infrastructure, “Safe Harbor” Cyber Attacks Point Toward Potential Beginning of Cyber-Detente Between US and Russia

June 23, 2021
While Presidents Putin and Biden still appear to be far apart on the issue of cyber attacks originating from the former's country, the two at least appear to be negotiating. Biden presented Putin with a list of critical infrastructure targets that could trigger serious retaliation.
Read More
Power plant at dusk showing cyber attack on natural gas producers
Cyber SecurityNews

Cyber Attack Targeted 21 Natural Gas Producers on the Eve of the Russian Invasion of Ukraine

March 18, 2022
Suspected state-sponsored hackers compromised at least 100 employees of at least 21 natural gas producers before staging a cyber attack on the eve of the Russian invasion.
Read More
Padlocks symbolizing data protection in the network showing Russian hackers brute force passwords
Cyber SecurityNews

NSA and GCHQ Warn That Russian Hackers Frequently Brute Force Passwords at Scale Using Kubernetes Clusters

July 8, 2021
A joint cybersecurity advisory by the NSA and GCHQ warns that Russian hackers are brute forcing passwords on the cloud using a Kubernetes cluster in a global cyber espionage campaign.
Read More
CPU processor socket on a computer motherboard showing the Intel chip vulnerability that impacts five years worth of computers
Cyber SecurityNews

“Unfixable” Intel Chip Vulnerability Could Undermine Encryption on Five Years Worth of Computers, But Is a Difficult Attack to Pull Off

March 16, 2020
Attacker exploiting new Intel chip vulnerability will need to go through multiple complex steps and have physical access to the device to gain full access to the system.
Read More
1 … 135 136 137 138 139 … 163

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results