LA County 750000 people data leak was caused by Nigeria
Los Angeles County Employee database was hacked by a Nigerian early this year leading to the leak of more than 750,000 user details to...
Why US President Barack Obama could not stop Russian Cyber attack on US Military
CBS News latest reports suggest that a cyber attack which took place in August 2015 brought US military to knees. The news source reported...
Microsoft Office 365 business email users hit by cyber attack
Cloud Security service offering company ‘Avanan’ has discovered that business email users of Microsoft Office 365 are vulnerable to a phishing cyber attack. The...
Yahoo latest data breach increases Cyber Attack anxiety among Businesses
Yahoo’s latest hack of 1 billion accounts has proved as a worst case example of an unnerving but increasing common phenomenon of cyber espionage....
IBM survey says that 70% businesses bow down to Ransomware
Ransomware report of IBM has revealed that most of the businesses bow down to hackers spreading ransomware by paying them the said pay-off to...
RASP and Security Against Internal Breaches
As companies consider their application security posture, it is critical to remember that breaches can come from both outside and inside the company and...
Russian President was directly involved in influencing 2016 US Elections!
US Intelligence officials believe that Russian President Vladimir Putin was directly involved in influencing 2016 US elections. As per the latest news post on...
Yahoo faces biggest cyber attack humiliation with 1 billion user accounts hack
Yahoo is facing its biggest cyber attack humiliation of all times as a 3-year old security breach is said to have exposed credentials of...
Survey anticipates Cloud Security market to cross $10 billion by 2021
Cloud Security service offering vendors will feel happy on hearing this news. According to a survey conducted by TechSci Research report, Global Cloud Security...
Vulnerabilities vs Misconfigurations
Vulnerability assessment is a necessary component of any complete security toolchain, and the most obvious place to start for anyone looking to improve their...
MOST POPULAR
How to Quickly Recover After a Third-Party Data Breach
I write all the time about how to prevent ransomware attacks and how the root cause in so many cases is an improperly secured...