CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Cyber Attack
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Attack

Rendering of human brain on technology background showing use of AI to counter cybersecurity adversaries
Cyber SecurityInsights

Proactive vs Responsive AI: Which One Protects Against Major Modern Adversaries in Cybersecurity?

January 12, 2021
Third wave AI cybersecurity uses a proactive, singular AI algorithm applied to all data on the network and is a predictive approach that alerts analysts before an attack occurs. Read More
Women with face mask using laptop showing increase cyber attacks on remote work during COVID-19
Cyber SecurityNews

New Security Report Breaks Down Increase in Cyber Attacks Due to Remote Work; Lack of Training, Overwhelmed IT Departments are the Main Issues

October 16, 2020
With the unprecedented increase in remote work, new study shows a global increase in nearly all types of cyber attacks since the COVID-19 social distancing measures began. Read More
Stock exchange chart with oscillators and indicators showing DDoS cyber attack on New Zealand Stock Exchange
Cyber SecurityNews

New Zealand Stock Exchange Shut Down by DDoS Cyber Attack

September 3, 2020
New Zealand’s Stock Exchange was crippled by a DDoS cyber attack, lasting four days and forcing the government to activate the National Security System requiring government agencies to work together. Read More
North Korean hacker sitting in front of laptop with digital North Korean flag in background conducting cyber attacks
Cyber SecurityNews

US Intelligence Agencies Warn of North Korean Hackers Running Cyber Attacks Against Banks, Stealing Billions

September 3, 2020
North Korean hackers are running cyber attacks that focus on fraudulent cash-outs at ATM machines by hacking payment systems, augmenting with use of social engineering elements. Read More
Cat playing with little mouse on the table showing cyber attack on unsecured databases
Cyber SecurityNews

New “Meow” Cyber Attack That Wipes Unsecured Databases Is a Malicious Throwback

August 4, 2020
"Meow" cyber attack seeks out unsecured databases and simply wipes them out without seeking either fame or material gain, as a form of activism or perhaps just for fun. Read More
Robot hand and human hand touching data protection icon showing how AI could stop the largest potential cyber attack in history
Cyber SecurityInsights

The Largest Cyber Attack of All Time Is Coming. And AI Could Help Stop It.

July 3, 2020
Largest cyber attack in history has been predicted to happen soon, companies should look into using AI based cybersecurity systems to decrease their probability of this attack. Read More
Australian flag with programming code background showing the state-sponsored cyber attacks that threaten Australian critical infrastructure
Cyber SecurityNews

State-Sponsored Cyber Attacks Threaten Australian Critical Infrastructure

July 2, 2020
Australian organisations have fallen victim to cyber attacks that are believed to be state-sponsored, raising alarm about the vulnerability of the country’s critical infrastructure. Read More
Fiber optics background with U.S. map showing social media speculation on biggest DDoS cyber attack in U.S.
Cyber SecurityNews

Biggest DDoS Cyber Attack on U.S. Just Rampant Social Media Speculation

June 30, 2020
A rampant speculation was circulated on social media claiming that T-Mobile had suffered the biggest DDoS cyber attack in U.S., which turned out to be groundless. Read More
Picture of jet engine showing why Chinese hackers could be behind the airline EasyJet’s cyber attack
Cyber SecurityNews

EasyJet Cyber Attack Likely the Work of Chinese Hackers

June 1, 2020
High-profile cyber attack that struck British budget airline EasyJet may have been carried out by Chinese hackers who have stolen email addresses and travel details of millions of passengers. Read More
Hackers wearing gloves working on laptop showing what enterprises can do to battle cyber attack
Cyber SecurityInsights

How Enterprises Can Battle Cyberattack Onslaught

April 15, 2020
New cybersecurity technologies will help companies better handle a cyber attack but they need to use more efficient methods to evaluate solutions that meet their security and regulation needs. Read More
Load More

Latest

Pedestrians cross the road in India showing impact of data breach on payment processor

Amazon, Swiggy Payment Processor Juspay Downplays Data Breach That Led To 100 Million Records Circulating on the Dark Web

Businessman walks in airport terminal showing potential immunity passports as COVID vaccine rolls out

Controversial “Immunity Passports” Debated as COVID Vaccine is Rolled Out

Flags of the European Union flying showing EDPB cross border data transfer guidance post Schrems II

European Data Protection Board Highlights Ways to Comply

People using messaging apps on smartphone showing revelations by privacy labels

New iOS Privacy Labels Reveal Major Data Collection Differences Between Messaging Apps

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Regulations Data Breach EU GDPR Cyber Threat
See all results