CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Tourist group having guided Segway city tour showing Magecart attack on online store
Cyber SecurityNews

Segway’s Online Store Infected With a Credit Card Skimmer Used in a Large-Scale Magecart Attack Campaign

February 4, 2022
Malwarebytes detected a credit card skimmer belonging to a potent Magecart attack threat actor on Segway's online store embedded within a favicon.ico image file.
Read More
Server room with computer racks showing local privilege escalation in Linux
Cyber SecurityNews

All Linux Distributions Affected by 12 Year-Old PwnKit Local Privilege Escalation Bug Allowing an Attacker to Execute Commands as Root

February 4, 2022
Qualys researchers said the 12-year-old memory corruption local privilege escalation vulnerability on polkit's Set User ID program pkexec is easily exploitable by novice attackers and affects every major Linux distribution.
Read More
User in front of laptop with virtual lock showing need for certificate automation
Cyber SecurityInsights

Meeting Increasing Security Requirements Is Necessary. But Getting There Is Still Painful for Large Enterprises. The Solution? Automation

February 7, 2022
In the last few years Apple and other browsers have essentially demanded that all certificate authorities gradually reduce the lifecycle of digital certificates. To be able to replace tens of, or even hundreds of thousands, of certificates in a compressed time frame, on a regular basis, is going to be nearly impossible without automation solutions.
Read More
Shell fuel and gas station in Germany showing cyber attack on German fuel suppliers
Cyber SecurityNews

Critical Infrastructure Hit Again as German Fuel Suppliers Victimized by Cyber Attack, Oil Shipments Forced to Use Alternative Depots

February 7, 2022
German fuel suppliers have been hit by a cyber attack threatens fuel supply. Nature of attack has yet to be identified, but the extent of the disruption would indicate ransomware or a malicious malware attack that wiped files.
Read More
Solana coin in hand showing DeFi project Wormhole network hack
Cyber SecurityNews

DeFi Project Hacked for $320 Million in Crypto; Wormhole Network Compromised by Previously Unknown Vulnerability

February 7, 2022
Just one month into the new year, the Wormhole network breach is already the second major incident involving a DeFi project following the attack on the Qubit Finance network.
Read More
A large barge for the transport of fuel on the Rhine in Germany showing cyber attack on oil terminals
Cyber SecurityNews

Fuel Troubles Continue in Europe as Oil Terminals in Netherlands and Belgium Suffer Cyber Attacks; Unclear if Breaches Are Coordinated

February 8, 2022
European oil terminals are reporting recent cyber attacks that have disrupted operations, collectively impacting port operations throughout Europe and Africa. Timing of cyber attacks in Europe raises questions about coordinated campaign.
Read More
News Corporation headquarters building in New York City showing cyber attack by Chinese hackers for cyber espionage
Cyber SecurityNews

News Corp Cyber Attack by Alleged Chinese Hackers Targets Wall Street Journal Reporters

February 9, 2022
The purpose of the cyber attack on WSJ appeared to be espionage, with information exfiltrated from email and Google Drive accounts since at least February 2020. Mandiant believes government-backed Chinese hackers conducted the operation.
Read More
iPhone with Macbook in the back with purple glow showing device management
Cyber SecurityInsights

Apple Business Essentials – Can Apple Make Inroads Into the Device Management Space?

February 10, 2022
Apple has introduced their Business Essentials offering which brings together device management, 24/7 support and cloud storage. But the move is garnering mixed responses within the community, with stakeholders involved expressing optimism and legitimate concern.
Read More
Snack aisle of a grocery store showing ransomware attack impact on supply chain
Cyber SecurityNews

Conti Ransomware Attack on UK’s KP Snacks to Cause Major Supply Chain Problems for Popular Treats

February 10, 2022
KP Snacks notified its partners to expect supply chain problems after a ransomware attack encrypted its IT systems, preventing order placement and shipment of deliveries.
Read More
Hands on laptop using social media showing social media scams
Cyber SecurityNews

FTC: Social Media Scams Surging, Represent an Underlooked Cyber Crime Risk

February 10, 2022
Over 95,000 United States consumers lost money to social media scams in 2021. The most common type of scam involves online shopping, but the largest individual losses were caused by investment scams.
Read More
1 … 139 140 141 142 143 … 163

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results