CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Attacks
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Attacks

Hacker behind virtual login screen showing credential-based attacks
Cyber SecurityInsights

Credentials Are the Best Chance To Catch the Adversary

December 22, 2022
Credentials are everywhere, they are a demonstrated weak link in organizational security, and malicious actors have demonstrated that they prefer using them over approaches. As a result, credentials are both the best and the last chance to catch adversaries.
Read More
Lecture room with empty seats showing cyber attacks on education sector
Cyber SecurityInsights

Three Ways To Safeguard Higher Education Establishments From Cyberattacks

November 29, 2022
Easy targets. That’s the best way to describe universities and colleges as targets of cyberattacks. Most still operate using legacy systems and infrastructure, and many users, devices, and inadequate cybersecurity policies make them easy prey for bad actors.
Read More
Thermal Power Plant with smoking chimneys showing cyber attacks on critical infrastructure
Cyber SecurityNews

Ukraine Warns of Massive Russian Cyber Attacks on the Country’s and Allies’ Critical Infrastructure

October 7, 2022
Ukraine warns of Russian plans for massive cyber attacks on Ukraine's critical infrastructure to slow down the counteroffensive and those of Kyiv's allies in retaliation for support.
Read More
Finger pointing at login screen showing password managers
Cyber SecurityInsights

Are Password Managers the Missing Link When It Comes To Protecting Organizations From Cyber Attacks?

October 3, 2022
Why is it that despite their proven ability to control password hygiene by generating strong and unique passwords, auto-filling passwords, and credentials, storing passwords and files, and auditing password security, 70% of organizations are still not using a password manager?
Read More
Startup business executive team taking notes on board wall showing cyber attack risks
Cyber SecurityInsights

Why Cybersecurity Is Crucial for Startups and How To Mitigate Risks

September 1, 2022
The life of a startup revolves around evolution, requiring a constant ability to pivot to adapt to the ever-changing technology industry landscape. This agility, while necessary for survival, creates opportunities for new risks. and cyber attacks.
Read More
Hacker hands at keyboard computer in a dark room showing cyber attacks
Cyber SecurityInsights

Top 4 Cyberattacks to Watch Out for in 2022

July 20, 2022
Here are the most significant cyber threats in 2022, and how some straightforward actions can spare your data from costly and time-consuming cyber attacks.
Read More
Hacker hunting for crypto showing cyber attacks
Cyber SecurityInsights

Fighting Back: Emergent Technologies To Secure Crypto Firms Against Cyberattacks

July 4, 2022
A strong recovery and resilience strategy will ensure that crypto and DeFi firms are able to rebound from cyber attacks with minimal disruptions to their operations, mitigating losses for their investors and users.
Read More
Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks
Cyber SecurityNews

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

June 30, 2022
The Russian hackers call themselves "Killnet" and first made the news in April with declarations of intent to conduct cyber attacks on critical infrastructure in other countries. The group has been linked to prior DDoS campaigns.
Read More
Close up of cyber criminal hacking and cyber attacks
Cyber SecurityNews

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

June 23, 2022
67% of businesses suffered subsequent cyber attacks within a year after the first incident, with 10% recording ten or more repeated breaches. Medium-sized firms were most impacted.
Read More
Security icons around businessman showing cyber defense for cyber attacks
Cyber SecurityInsights

How Businesses Can Prepare For, and Ultimately Prevent Cyber Attacks

June 17, 2022
Organizations and their employees can mount a formidable cyber defense against cyber attacks by having an incident response plan in place, educating employees on cyber-safety practices, and integrating zero-trust with existing security models.
Read More
Load More

Latest

Yellow crime scene tape on computer keyboard showing law enforcement operations on Hive ransomware gang

Hive Ransomware Shut Down by Law Enforcement Operation; FBI in Possession of Decryption Keys, Group’s Public-Facing Website

Woman holding glasses showing data privacy regulations

Navigating the Data Privacy Landscape in 2023

WhatsApp app icon on a smartphone showing GDPR violations

WhatsApp Receives €5.5 Million Fine for GDPR Violations

League of Legends website page showing security breach of game cheats and source code

Security Breach at Riot Games Reveals Game Cheats, Source Code for Popular eSport “League of Legends”

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results