CISOMAG
Cerberus – A Banking Trojan Disguised as Currency Converter
Researchers from Avast discovered a malicious Android app “Cerberus” on the Google Play store spreading a banking Trojan. The Trojan was being spread via...
Cybercrimes in U.K. Doubled Since 2015, Costing Businesses $108 Bn
Research from business ISP provider Beaming revealed that the number of businesses in the U.K. that affected by cyberattacks has doubled since 2015. The...
Deloitte Prescribes 5-Step Security Approach to Protect Enterprises and WFH Employees
With no end in sight to COVID-19, organizations have now accepted work from home (WFH) as the new normal. In fact, many Indian companies...
Hackers Hide Phishing Links Inside .ics Calendar Invitations
Threat actors are finding innovative methods to phish people into clicking/downloading malicious links or entering sensitive information on fake forms. In a recent security...
Telehealth Privacy and Security
The Coronavirus pandemic has catalyzed a rapid increase of telehealth adoption. Leveraging telehealth platforms, patients are able to speak with doctors and nurses without...
Data Breach Affects Millions of Dating App User Records
Security researchers from cybersecurity firm Wizcase discovered misconfigured databases leaking millions of records belonging to five dating service providers in the U.S. and East...
DXC’s Xchanging Subsidiary Falls Prey to Ransomware Attack
Xchanging, DXC Technology’s subsidiary and an Australian based IT services provider rendering services to insurance companies, reportedly experienced a ransomware attack. According to its...
NSA Issues Guidelines on Securing Virtual Private Networks
The U.S. National Security Agency (NSA) issued a set of guidelines on securing IPsec (IP security) and Virtual Private Networks (VPNs) against potential cyberthreats....
Hacker Infiltrates 22,900 Unsecured MongoDB Databases to Demand Ransom
An unknown hacker took control of over 22,900 unsecured MongoDB databases that were left online without password protection, a number that accounts for roughly47%...
The Zero Trust Primer: A Simple Overview of the NIST 800-207...
Zero Trust as a concept has but one fundamental assumption. Nothing should be implicitly trusted - not your identities, not your devices, not your...