CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Team discussing cybersecurity strategy in front of laptops
Cyber SecurityInsights

Can Your Cybersecurity Strategy Stop a Determined Attacker?

June 24, 2022
If your current system isn’t capable of tracking and assessing different user variables online, chances are your business isn’t fully prepared to stop a determined attacker. What layers is your cybersecurity strategy missing?
Read More
Close up of cyber criminal hacking and cyber attacks
Cyber SecurityNews

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

June 23, 2022
67% of businesses suffered subsequent cyber attacks within a year after the first incident, with 10% recording ten or more repeated breaches. Medium-sized firms were most impacted.
Read More
Iran flag on a black keyboard showing spear phishing for account takeover
Cyber SecurityNews

Iranian Spear Phishing Operation Targeting US and Israeli Government Figures, Email Account Takeovers Lead to Impersonation Campaigns

June 23, 2022
The Iran-backed campaign targets prominent Israelis and uses spear phishing to gain access to emails, leveraging the account takeover to hijack existing conversations.
Read More
Opened hand levitating virtual objects showing Web3
Cyber SecurityInsights

What Does Web3 Truly Look Like?

June 23, 2022
New, decentralized Web3 technologies stand to address virtually all concerns of the old internet, but there’s a catch. All too often these networks are still built upon legacy infrastructure, and, as such, are exposed to many of the same defects.
Read More
Metamask Web3 wallets on mobile phone screen showing Chinese hackers
Cyber SecurityNews

Web3 Wallets Targeted by Chinese Hackers; “SeaFlower” Using Cloned Websites to Trick Crypto Traders

June 22, 2022
The Chinese hackers are distributing backdoored Web3 wallets, primarily targeting searches for Coinbase Wallet, imToken, MetaMask and Token Pocket, and are focused on both iOS and Android users.
Read More
Bunch of rough shape keys showing user credentials sold on dark web
Cyber SecurityNews

Over 24 Billion Compromised User Credentials Circulating on the Dark Web Market

June 22, 2022
Digital Shadows Photon Research team found that over 24 billion stolen user credentials were available for sale on the dark web market in 2022, an increase of 65% in two years.
Read More
Developers working together showing DevSecOps and threat modeling
Cyber SecurityInsights

A Case for Modernizing Threat Modeling in 2022

June 22, 2022
More recent approaches to threat modeling is including DevSecOps, putting a greater focus on developers as a critical arm of cybersecurity. Additionally, threat modeling is pulling away from a reliance on security professionals looking at finished products, instead asking engineering to embrace the concept of security as code.
Read More
View of Microsoft office showing vulnerability disclosure
Cyber SecurityNews

Tenable CEO: Microsoft Vulnerability Disclosure and Patching Practices Are Insufficiently Transparent, Put Customers at Risk

June 21, 2022
Tenable CEO cites reports from several cybersecurity firms that indicate Microsoft is not being timely enough with its vulnerability disclosures and sometimes has a "dismissive" attitude.
Read More
Notifications about many unread messages on Facebook Messenger on a smartphone showing phishing campaign on Facebook credentials
Cyber SecurityNews

One Million Facebook Credentials Compromised in Four Months by Ongoing Phishing Campaign

June 21, 2022
Security researchers have documented a Facebook credential phishing campaign that has been active since late 2021, and has been highly successful in duping victims using an authentic-looking spoofed login page.
Read More
Group of Chinese hackers in front of China flag showing cyber espionage in APAC
Cyber SecurityNews

Previously Undiscovered Team of State-Sponsored Chinese Hackers, Has Been Quietly Committing Cyber Espionage in the APAC Region for a Decade

June 20, 2022
Cyber espionage group is thought to have been in action since at least 2013, with a heavy focus on certain APAC countries and regions. The Chinese hackers also focuses in on political targets.
Read More
1 2 3 4 … 164

Latest

Harmony cryptocurrency coin on colorful background showing crypto hack of blockchain bridge

Horizon Blockchain Bridge Latest Crypto Hack Victim, $100 Million Stolen

Aerial view of oil refinery plant showing critical infrastructure cyber defense

Why Investments in Better Infrastructure Cyber Defense Are Just a Start

Hacker hand stealing data from laptop at night showing data breach

Flagstar Bank Data Breach Leaked Sensitive Information of 1.5 Million Customers

Hand holding a smart phone with ride hailing app DiDi logo on screen showing data compliance for China app stores

Closed to New Users for Months Due to Data Compliance Violations, Ride Hailing App Didi Set to Return to China App Stores

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results