Home Authors Posts by CISOMAG

CISOMAG

3853 POSTS 0 COMMENTS

Millions of Computers Open to Thunderbolt Port Vulnerabilities

0
A security researcher at the Eindhoven University of Technology, Bjorn Ruytenberg, have discovered that Thunderbolt-equipped computers contain vulnerabilities that could leave millions of computers...

Don’t Abandon Security During a Crisis

0
Working within dispersed teams is often part and parcel of a CISO’s job. In fact, before COVID-19, 7% of Americans were working remotely either...

10 Mn Malware Attacks Detected Every Day In Last 30 Days

0
Security researchers from Atlas VPN found nearly 404 million malware infections during the last 30 days (in April 2020) globally, which is over 10...

Teen Hackers Accused of Cryptocurrency Theft, Sued For $71 Mn

0
A cryptocurrency investor accused a teen hacker and his crew of juvenile hackers for stealing $24 million in cryptocurrency via a SIM swap attack....

“Shiny Hunters” Hacker Group Keep 73 Mn User Records on Darknet

0
Members of the “Shiny Hunters” hacking group are flooding the dark web with leaked databases for sale. The hacking group is alleged of compromising...

“Attackers always look for and exploit trending topics”

0
CISO MAG met Shyam Sundar Ramaswami, Lead Security / Threat Researcher, Cisco, at the NULLCON event held in Goa, in February 2020. Ramaswami is...

“InfinityBlack” Hacking Group Busted in Poland, 5 Hackers Arrested

0
Five suspected members of a hacking group “InfinityBlack” were arrested on April 29, 2020, in a special operation carried out by the Polish National...

Cyber Espionage Campaign “Naikon APT” Targets Government Entities in APAC Region

0
A Chinese hacker group is behind an ongoing cyber espionage campaign targeting government entities in the Asia-Pacific (APAC) region, according to a new report...

Microsoft Offers $100,000 Bounty to Hack Its Azure Sphere Linux IoT...

0
Microsoft recently announced its bug bounty program “The Azure Sphere Research Challenge,” which offers security researchers up to $100,000 bounty to break into its...

How Law Firms Can Demonstrate Strong Cybersecurity Practices

0
Law firms have long been known as a "soft target" for bad actors in the technology space. The amount of sensitive data that exists...

MOST POPULAR

RECENT POSTS