Home Authors Posts by CISOMAG

CISOMAG

3506 POSTS 0 COMMENTS

Beware! Hackers Found Exploiting Proxyware to Sell Users’ Internet Connection

It’s common for threat actors to leverage a variety of new malicious techniques for financial gain. Recently, security experts from Cisco Talos uncovered a...

CISA Urges Organizations to Avoid Bad Security Practices

The cyber threat landscape is growing exponentially worldwide, with organizations suffering a series of ransomware and extortion attacks. According to an analysis from the...

Ransomware – What is new?

Executives are worried.  They see organizations crippled by ransomware, often for days or weeks, and rumors of multimillion-dollar fines being paid. By Ian Mann, CEO...

What Is Steganography and Its Popular Techniques in Cybersecurity?

The word steganography stems from the Greek origin “steganos” (secret) and “graphy” (writing or drawing), which loosely translates to hidden writing. It is a...

Cyberattack Lands on Bangkok Airways

Cyberattacks on airlines always seem to have a hard landing. The recent victim of airline attacks is Thailand-based Bangkok Airways. The airline company admitted...

FBI Raises Red Alert About Hive Ransomware Group

Authorities from the FBI are warning about a new ransomware group, tracked as Hive, which was behind the recent attacks on multiple health care...

“Zero-trust is not a product or solution that can be installed”

Under the prevailing circumstances of the pandemic, IT assets are no longer present behind the safe confines of corporate firewalls. Rather, they are dispersed...

Five Critical Skills You Need to Have as a Web Application...

Two decades back, most of the tasks related to web application security were conducted by quality assurance teams. These professionals were responsible for ensuring...

How to Protect Your Credit Card Data Online

Sensitive financial data remains a primary target for cybercriminals. Adversaries often target sensitive financial data such as credit/debit card numbers, CVV, and other bank...

Email Threats Continue to be Gateway of Major Cyberattacks

Cyberattacks via unsolicited emails remain an effective attack vector as threat actors continue to evolve their phishing techniques. Adversaries are quick to adopt new...

MOST POPULAR

RECENT POSTS