Cybersecurity- Insiders

LA County 750000 people data leak was caused by Nigeria

Los Angeles County Employee database was hacked by a Nigerian early this year leading to the leak of more than 750,000 user details to...
Cybersecurity- Insiders

Why US President Barack Obama could not stop Russian Cyber attack on US Military

CBS News latest reports suggest that a cyber attack which took place in August 2015 brought US military to knees. The news source reported...
Cybersecurity- Insiders

Microsoft Office 365 business email users hit by cyber attack

Cloud Security service offering company ‘Avanan’ has discovered that business email users of Microsoft Office 365 are vulnerable to a phishing cyber attack. The...
Cybersecurity- Insiders

Yahoo latest data breach increases Cyber Attack anxiety among Businesses

Yahoo’s latest hack of 1 billion accounts has proved as a worst case example of an unnerving but increasing common phenomenon of cyber espionage....
Cybersecurity- Insiders

IBM survey says that 70% businesses bow down to Ransomware

Ransomware report of IBM has revealed that most of the businesses bow down to hackers spreading ransomware by paying them the said pay-off to...
Cybersecurity- Insiders

RASP and Security Against Internal Breaches

As companies consider their application security posture, it is critical to remember that breaches can come from both outside and inside the company and...
Cybersecurity- Insiders

Russian President was directly involved in influencing 2016 US Elections!

US Intelligence officials believe that Russian President Vladimir Putin was directly involved in influencing 2016 US elections. As per the latest news post on...
Cybersecurity- Insiders

Yahoo faces biggest cyber attack humiliation with 1 billion user accounts hack

Yahoo is facing its biggest cyber attack humiliation of all times as a 3-year old security breach is said to have exposed credentials of...
Cybersecurity- Insiders

Survey anticipates Cloud Security market to cross $10 billion by 2021

Cloud Security service offering vendors will feel happy on hearing this news. According to a survey conducted by TechSci Research report, Global Cloud Security...
Cybersecurity- Insiders

Vulnerabilities vs Misconfigurations

Vulnerability assessment is a necessary component of any complete security toolchain, and the most obvious place to start for anyone looking to improve their...