Home Authors Posts by CISOMAG

CISOMAG

3306 POSTS 0 COMMENTS

“IoT technology will always improve but it will never be 100%...

The proliferation of the Internet of Things (IoT) in consumer, enterprise, and health care sectors, and their internal vulnerabilities, have created a security blind...

Cyber Risk Management: Does cyber risk get enough boardroom airtime?

Cybercrime is not a burgeoning criminal industry; it is an established threat with severe consequences that cannot be ignored by businesses – and it...

How Surge in Remote Work Led to Rise of BYODs and...

The sudden surge in remote work due to the pandemic has encouraged organizations globally to embrace Bring Your Own Devices (BYODs) in the workplace....

Supply Chain Attacks and Vulnerability Disclosures

In the past year, we have seen accelerated adoption of digital platforms and technologies. For instance, more businesses and individuals are turning to e-commerce...

Dump the Password! 80% CISOs say They are Not an Effective...

Ever since the pandemic began, organizations globally encountered drastic changes in their business operations.  The swift adoption of remote working significantly impacted the role...

Use iPhone 6 Plus? Apple has an Urgent Security Update for...

Cybercriminals have started exploiting vulnerabilities at will and to make it worse, they are now penetrating deeper by finding zero-day vulnerabilities. Owing to this,...

How Attackers Are Using SEO Poisoning to Deliver ‘SolarMarker’ Remote Access...

From malicious email attachments to weaponized PDFs, cybercriminals leverage various traps to target unwitting victims. At times, threat actors rely on old hacking techniques...

The Vulnerabilities that Open the Door to Ransomware

The Darkside ransomware group brought the Colonial Pipeline to its knees in May 2021. In another incident that soon followed, REvil (Ransomware Evil), a...

New Cyber Espionage Group ‘BackdoorDiplomacy’ Found Targeting Diplomats and Telcos in...

Cybercriminals often leverage sophisticated deceptive techniques to evade detection from federal agencies. Many international cyberespionage campaigns were uncovered after they exploited the target or...

The Edward Don Ransomware Attack – A Reminder of Disruption Caused...

Ransomware attacks targeted towards supply chains in the U.S. have spiraled indiscriminately in the recent past. The incidents are growing by the day, and...

MOST POPULAR

RECENT POSTS