CISOMAG
Supply Chain Security – A CISO Point of View
Recent news about the SolarWinds compromise and Trojan horse introduced in their software raises a question: How can organizations ensure the security of their...
Darkside Ransomware Gang Adopts New Extortion Technique by Targeting Stock Traders
Cybercriminals often try innovative methods in their attacking techniques to increase their success rate and evade security detection (obfuscation). From new malware variants to...
HCL Technologies and IBM Join Forces to Build Modern SOC Platform
On April 27, 2021, two tech giants – HCl Technologies and IBM – announced a collaboration, which will help streamline threat management services through...
Think Before You Scan! Malicious QR Codes in the Wild
Since the outbreak of the COVID-19 pandemic, people across the globe have encountered dramatic changes in their daily lives. From the way we used...
Leveraging Security Psychology to Mitigate Cybersecurity Risk
Problem Statement: Human risk is real, and information and cybersecurity awareness trainings are not assuring and adequate. Period.
Often security trainings are compliance-focused, as against...
U.S. Space Command to Launch New Cyber Center for Better Cyber...
Cybersecurity is a critical element for the smooth functioning of a business. Having the right security solution works wonders for an IT architecture for...
Eaton Releases Patches to Fix Severe Vulnerabilities in its Intelligent Power...
Eaton, a power management solutions provider had some severe vulnerabilities in its Intelligent power management (IPM) solution, which potentially allowed threat actors to penetrate...
Ransom Mafia Extort Money By Forming Ransomware Cartels
The adage “Apes Together Strong,” denotes apes working together for a common goal that would eventually benefit them. Similarly, several cybercriminal groups join hands...
In IT Security, All Roads Lead to Identity
The increasing use of cloud services and automation solutions or even the switch to remote work has made identity the new perimeter security. With...
Months After the Breach, Threat Actors Leaked Database of 20 Mn...
The pandemic has given a lift to e-commerce platforms. Due to the social distancing norms, travel restrictions, and curfews, people all over the world...