CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Stack of dollar bills showing 2026 budget
Cyber SecurityNews

Trump’s 2026 Budget Would Cut Nearly a Quarter of CISA’s Funding

June 17, 2025
The CISA 2026 budget cuts would be accompanied by a reduction of 1,083 CISA positions, a cut of almost a third of its present count of 3,292 employees. The Cyber Defense Education and Training program would also be gutted, with the budget proposal suggesting that it could be replaced by free resources.
Read More
Criminal talking on the phone showing vishing attacks
Cyber SecurityNews

Google Warns Salesforce Customers of Large-Scale Vishing Attacks

June 11, 2025
Google warns Salesforce customers about vishing attacks by hackers impersonating IT support to lure employees into connecting a rogue app, exfiltrate data, and demand ransom.
Read More
Google logo showing certificate authorities
Cyber SecurityNews

Google to Distrust Two Certificate Authorities Over Compliance Issues

June 10, 2025
Google says it will start distrusting digital certificates issued by two certificate authorities due to, Chunghwa Telecom and Netlock, compliance issues and failure to address public incidents.
Read More
Hands typing on keyboard showing security incident
Cyber SecurityNews

Victoria’s Secret Security Incident Shuts Down Lingerie Giant’s Systems

June 9, 2025
Victoria’s Secret suffered a security incident that forced the lingerie giant to shut down impacted IT systems to prevent the attack from spreading and safeguard data.
Read More
Cars waiting on the road showing vehicle security
Cyber SecurityNews

Balancing Safety and Security in Software-Defined Vehicles

June 9, 2025
The evolution of software-defined vehicles (SDVs) has led to exciting innovation in the automotive industry, but it has also brought challenges surrounding vehicle safety and security. Unlike traditional vehicles, which relied on mechanical systems with limited software, SDVs are “software on wheels.”
Read More
Open digital lock showing data breach at data broker
Cyber SecurityNews

Controversial Data Broker LexisNexis Data Breach Impacts Over 364,000 People

June 4, 2025
Data broker LexisNexis has disclosed a significant data breach that exposed the personal information of over 346,000 people after a threat actor compromised its GitHub account.
Read More
Chess pieces showing AI and cybercriminals
Cyber SecurityInsights

The New Chess Masters: How Cybercriminals Are Using AI to Outsmart Security Defences

June 4, 2025
In a high-stakes chess match, the grandmaster doesn’t win by brute force; they win by observing, anticipating, and exploiting small weaknesses in their opponent’s position. Every move is part of a strategy. This is exactly how cybercriminals operate today.
Read More
Hacker using smartphone showing infrastructure provider for cyber scams
Cyber SecurityNews

Funnull Infrastructure Provider Hit With OFAC Sanctions Over Role in Cyber Scams

June 2, 2025
Philippines-based Funnull Technology, along with one of its administrators, has been hit with OFAC sanctions for its role as a knowing infrastructure provider for hundreds of thousands of malicious sites engaging in cyber scams.
Read More
Microsoft office building showing OneDrive security flaw
Cyber SecurityNews

Security Flaw in Microsoft OneDrive File Picker Could Give Apps Full Cloud Storage Access

June 2, 2025
Researchers found a security flaw in OneDrive File Picker that grants apps access to any and all files in the account when the user grants permission for just one file upload, with the language governing this process cited as too "vague" and "unclear" to communicate what is actually happening.
Read More
Hacker working showing third-party breach of customer data
Cyber SecurityNews

Adidas Warns of a Third-Party Breach That Compromised Customer Data

June 2, 2025
German sportswear giant Adidas has confirmed that a third-party breach compromised customer data amid ongoing cybersecurity incidents rocking the company in other countries.
Read More
1 2 3 4 5 … 292
- Advertisement -
- Advertisement -

Latest

Globe and data showing content scraping of AI bots

Cloudflare Announces New Content Scraping Protection Feature; “Easy Button” Stops AI Bots With a Click

Plane with NATO logo showing ICC cyber attack

ICC Suffers Sophisticated Cyber Attack During NATO Summit

Airplane at dusk with control tower showing data breach due to contact center

Qantas Data Breach: Third-Party Contact Center Platform That Stored Six Million Customer Records Hacked

Skull and bones on screen showing ransomware attack on Swiss government provider

Swiss Government’s Ransomware Attack Impacts Numerous Departments, Hacker Leaks Terabytes for Free

- Advertisement -
- Advertisement -
- Advertisement -
- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2025 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results