Hackers are using fake data to alter critical databases
A new cyber threat is on the horizon where hackers are using fake data to alter critical databases such as stock markets and soil...
Will it Pwn CVE-2017-5638: Remote Code Execution in Apache Struts 2?
This post was originally published here by AJIN ABRAHAM.
A few days back Nike Zheng reported a Remote Code Execution vulnerability in Apache Struts2. The vulnerability exploits...
Ransomware attack on Milwaukee’s 18000 Urology Patients
A Ransomware attack which took place in the department of Metropolitan Urology Department of Milwaukee, Wisconsin is said to have exposed patient data of...
North Korea tags the United States as a Hacking Empire
A couple of months ago, United States accused North Korea of launching cyber attacks on many international banks and other institutions all around the...
How to keep your Twitter account safe from Cyber Attacks
Last week, the media buzzed with reports saying Twitter accounts of westerners were hacked with Swastikas and messages supporting Turkey’s President Tayyip Erdogan. What’s...
Cyber Attack on McDonald’s app leaks info of 2.2 million users
Critical info of more than 2.2 million McDonald’s Indian users was leaked by hackers to the dark web. The info includes phone numbers, addresses,...
Cloud Security beefed up for IBM Blockchain
IBM has upped the cloud security feature for its Blockchain Cloud Environment which is in coincidence with the release of its Hyperledger Fabric Version...
How to Save $2.04M on Secure Office 365
This post was originally published here by Rich Campagna.
I have a lot of conversations with organizations trying to evaluate not only the functional differences, but...
Russian Government denies involvement in Yahoo Hack!
Russian Federal Security Service (FSB) has denied its involvement in hacking US based companies which include Yahoo. Kremlin (FSB) has reiterated the claim that...
Rural water utility systems are vulnerable to cyber threats says US Intelligence
Intelligence Agencies of United States have warned the authorities managing the rural water utility systems of the rising threat of cyber attacks. The threat...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...