CISOMAG
California Voters Say “Yes” to Proposition 24 for Expansion of Data...
California is popularly known as the state that laid the foundation of a stringent data privacy law in the U.S. With its historic amendment...
Japanese Gaming Giant Capcom Hit by a Cyberattack
Japanese game developer and publisher Capcom suffered a security incident on November 2, 2020, which impacted its operations, including email and file servers. The...
CYFIRMA’s Threat Landscape Report Reveals Interesting Trends and Threat Actors Targeting...
CYFIRMA, a Singapore-based cybersecurity firm, has released the India Threat Landscape Report 2020. The researchers at CYFIRMA have been actively observing global cyberattack trends...
1 in 4 Cyberattacks Handled by U.K.’s NCSC Were Related to...
Over one in four security incidents handled by the U.K.’s National Cyber Security Centre (NCSC) last year were COVID-19 related cyberthreats. In its annual...
Ping Identity Acquires Symphonic Software to Enable Enterprises to Prevent Fraud
Intelligent identity solutions provider Ping Identity has acquired authorization solutions provider Symphonic Software to help enterprises prevent cyber risks and enhance their cybersecurity posture....
5G Security: Possible Risks and Challenges
5G is taking the world by storm. This game-changing technology takes mobile connectivity to a whole new level by introducing jaw-dropping speeds and low...
Compliance: A Chief Tenet for the Future of Cybersecurity
COVID-19 has questioned the status quo of the business world. Businesses are transforming digitally and integrating newer technologies to deliver value to customers. However,...
Marriott International Slapped with $123 Mn GDPR Fine for 2014 Data...
The U.K.’s Information Commissioner’s Office (ICO) imposed £18.4 million ($23.92 million) fine on Marriott International Inc. for violating the GDPR guidelines. The data privacy...
REvil Ransomware Buys KPOT Malware; Adds Another Weapon to its Arsenal
Last month, operators of the infamous information-stealing malware KPOT held an online auction on a dark web forum. Interestingly, the KPOT malware auction saw...
Old Unpatched Vulnerabilities Could Invoke Cyberattacks and Malware
The “new normal” business operations left most organizations vulnerable to new attack vectors. From database misconfigurations to unpatched vulnerabilities, organizations suffered several challenges in...