CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Cyber Threat
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Threat

Bug on laptop keyboard showing malware distributed to ASUS computers in a massive supply chain attack
Cyber SecurityNews

ASUS Supply Chain Attack Highlights New Security Vulnerability For Tech Giants

April 15, 2019
A massive supply chain attack had distributed malware to tens of thousands of ASUS computers worldwide through legitimate ASUS software updates. It appears as if the attackers had inside information about ASUS servers and systems. Read More
Hacker working in front of laptop showing extension of attacks to political, diplomatic and military targets in U.S, Australia, and U.K by Iranian hackers
Cyber SecurityInsights

Iranian Hackers Increasing Their Activity Worldwide as Part of New Cyber-Espionage Program

April 16, 2019
Iranian hackers are extending their attacks to political, diplomatic and military targets in U.S, Australia, and U.K. It now appears to be part of a long-term, state-sponsored cyber hacking campaign by Iran. Read More
Computers in black and white showing that universities are still very vulnerable to cyber attacks
Cyber SecurityInsights

Recent Hacks Show That Even Tech-Savvy Universities Are Still Very Vulnerable to Cyber Attacks

April 17, 2019
Put to the test, more than 50 U.K. universities were found to be very vulnerable to cyber attacks. Jisc's team of penetration testers were able to breach defenses in one to two hours with a 100% breach rate. Read More
Currencies banknotes and coins showing evolution of cyber threats to international payment flows
Cyber SecurityNews

New SWIFT Report Details Cyber Threats to International Payment Flows

April 23, 2019
Recent SWIFT report shows an evolution of cyber threats to international payment flows with cyber criminals becoming increasingly sophisticated in evading detection when carrying out fraudulent payment transactions. Read More
Computers in IT service provider office showing vulnerability for supply chain attacks
Cyber SecurityNews

Supply Chain Attack on Wipro Highlights Service Provider Vulnerabilities

April 24, 2019
Vulnerable IT service providers are becoming entry points for supply chain attacks as seen in the recent attack on Wipro. The attack follows closely after Wipro CEO declares "security cannot be a show stopper for business priorities". Read More
Hacker touching a smart phone screen showing how hackers attack mobile apps and the methods to protect against it
Cyber SecurityInsights

How Hackers Attack Mobile Apps

April 26, 2019
Majority of fraud transactions are coming from mobile apps and mobile browsers. How do the hackers attack mobile apps and how could you protect yourself against it? Read More
Skull against hexadecimals background showing an increase of ransomware attacks in spring 2019
Cyber SecurityNews

Ransomware Attacks Enjoying a Spring Renaissance

April 30, 2019
Are ransomware attacks making a comeback as a dominant cyber security threat? Norsk Hydro, Verint, Weather Channel and Arizona Beverages are among the big names who have fallen victim in recent weeks. Read More
Hacker working on computer showing new wave of hacking through AI-powered malware, smart phishing and open source attacks
Cyber SecurityInsights

AI-Powered Malware, Smart Phishing and Open Source Attacks, Oh My! The New Wave of Hacking in 2019 and How to Prevent.

May 2, 2019
The IT security industry is facing a new wave of hacking through smart technology, machine learning, and artificial intelligence where hackers will unleash unethical tactics to target and manipulate individuals and organizations. Read More
Hacker behind computer showing how tools and source code used by Iranian hackers were exposed
Cyber SecurityNews

Iranian Hackers Get Hacked

May 7, 2019
Mysterious organization exposed tools and source code used by Iranian hackers, including personal information of some Iranian Ministry of Intelligence members responsible for state-sponsored cyber attacks. Read More
Hacker working on computer showing Chinese spies using NSA cyber weapons long before Shadow Brokers hacker group released them
Cyber SecurityNews

Chinese Spies Stole NSA Cyber Weapons Before They Were Leaked by Shadow Brokers

May 20, 2019
Chinese spies known as Buckeye group are alleged to be using some of the NSA cyber weapons as early as March 2016, long before Shadow Brokers released them in April 2017. Read More
Load More

Latest

Pedestrians cross the road in India showing impact of data breach on payment processor

Amazon, Swiggy Payment Processor Juspay Downplays Data Breach That Led To 100 Million Records Circulating on the Dark Web

Businessman walks in airport terminal showing potential immunity passports as COVID vaccine rolls out

Controversial “Immunity Passports” Debated as COVID Vaccine is Rolled Out

Flags of the European Union flying showing EDPB cross border data transfer guidance post Schrems II

European Data Protection Board Highlights Ways to Comply

People using messaging apps on smartphone showing revelations by privacy labels

New iOS Privacy Labels Reveal Major Data Collection Differences Between Messaging Apps

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Regulations Data Breach EU GDPR Cyber Threat
See all results