CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Attacks
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Attacks

Close up of cyber criminal hacking and cyber attacks
Cyber SecurityNews

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

June 23, 2022
67% of businesses suffered subsequent cyber attacks within a year after the first incident, with 10% recording ten or more repeated breaches. Medium-sized firms were most impacted.
Read More
Crytocurrency mining farm showing malware cyber attacks on cloud servers
Cyber SecurityNews

Almost All Cyber Attacks on Cloud Servers Involve Cryptocurrency Mining, a New Study Found

September 25, 2020
Researchers discovered that almost all cyber attacks on cloud servers are aimed at installing cryptocurrency mining malware.
Read More
Finger pointing at login screen showing password managers
Cyber SecurityInsights

Are Password Managers the Missing Link When It Comes To Protecting Organizations From Cyber Attacks?

October 3, 2022
Why is it that despite their proven ability to control password hygiene by generating strong and unique passwords, auto-filling passwords, and credentials, storing passwords and files, and auditing password security, 70% of organizations are still not using a password manager?
Read More
Hand hold digital hologram Artificial Intelligence (AI) sign showing cyber attacks
Cyber SecurityInsights

Artificial Intelligence: The Enemy and The Solution

October 25, 2021
How do we prevent AI from being used as a tool for cyberattacks? We need to come up with ways to keep AI under control and stop hackers from manipulating automated computer systems and cause them to take actions they were never intended to take.
Read More
Cyber SecurityInsights

Bulletproof Your Enterprise Cybersecurity Against State-Sponsored Attacks

July 22, 2021
Here’s what needs to be done at the enterprise level to ensure bulletproof cybersecurity against state-sponsored cyber attacks in the most uncertain times of COVID-19 and beyond.
Read More
Chinese national flag on circuit board showing Chinese hackers cyber attacks
Cyber SecurityNews

Chinese Hackers Targeting Outer Layers of Networks for Cyber Attacks, Using New Malware for “Multi-Year” Intrusions

March 27, 2023
Chinese hackers are now focusing on the outer layers of target networks, even antivirus software and firewalls, as an entry point for stealthy cyber attacks that can last for years.
Read More
Hacker behind virtual login screen showing credential-based attacks
Cyber SecurityInsights

Credentials Are the Best Chance To Catch the Adversary

December 22, 2022
Credentials are everywhere, they are a demonstrated weak link in organizational security, and malicious actors have demonstrated that they prefer using them over approaches. As a result, credentials are both the best and the last chance to catch adversaries.
Read More
Finger pointing at open lock showing increase in cyber attacks during COVID-19
Cyber SecurityInsights

Cyber Attacks Are Growing More Sophisticated During the COVID-19 Pandemic; Here’s How to Defend Against Them

November 9, 2020
Protect your company and customers by layering multiple security protections against cyber attacks including employee education, strong authentication, passive biometrics and behavioral analytics.
Read More
Businessman uses a virtual network connection to protect data with a padlock showing cyber attacks under GDPR
Data ProtectionInsights

Cyber Attacks Under the GDPR

December 20, 2021
Be vigilant when you engage with third party service providers. Ultimately it is your responsibility under the GDPR when cyber attacks and data breaches occur, not solely your service providers.
Read More
Hook and lock on credit cards showing phishing attacks and cyber attacks
Cyber SecurityInsights

Even Today, Phishing Attacks Remain a Popular Cyberattack Method

April 13, 2022
The nature of phishing attacks and the role of human error in the problem means that it’s unlikely we can completely eliminate this threat. Implementation of behavioral analytics solutions allow security teams to clearly identify irregular or abnormal behaviors and take action to determine if someone with access is a potential threat.
Read More
Load More

Latest

Crypto exchange charts showing data breach

$70 Million Loss After Data Breach of CoinEx Crypto Exchange, Services Temporarily Suspended

Businessman holding virtual world with connection and human icon showing privacy by design

Embracing Privacy by Design as a Corporate Responsibility

Virtual locks on laptop screen showing Europe and post quantum computing

Why Europe Needs to Prioritize the Switch to Quantum-Safe Encryption

Police car siren flashing blue in the night showing third-party data breach

Greater Manchester Police Investigating a Third-Party Data Breach From a Ransomware Attack

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results