Home Search

unsecured servers - search results

If you're not happy with the results, please do another search
Secret Terrorist Watchlist Leak, Aruba

Secret Terrorist Watchlist with 1.9 Mn Records Exposed Online

Sometimes, misconfigured servers and unsecured databases go unnoticed until security researchers report about them. Bob Diachenko, Head of Security Research at Comparitech, recently discovered...
106 million Thailand visitors

Another Case of Unprotected Database: 5 Bn Records from Previous Data Breaches Leaked

Unsecured databases are potential cyberthreats for organizations. Perpetrators often look for unprotected/misconfigured servers to infiltrate and compromise sensitive corporate data. A recent security research...
Application Security

The Role of a CISO in Ensuring Application Security for Employees

Cybersecurity, now part of the DNA of today’s economy, is significantly about application security. Apps have become ubiquitous today, with every business wanting one....
COVID-19 Cyberthreats

Cybersecurity After COVID-19

In addition to the health and economic impacts of COVID-19, society had to grapple with a plethora of new and persistent cybersecurity threats. As...

Identity Management Day: Here’s What Experts Have to Say

Research has pointed out that nearly 80% of organizations have faced some sort of security breach due to identity-related issues, even here nearly every...
Fortinet VPN, VPN, VPN devices

Don’t use these Android VPNs. They Leak Your Credentials!

VPN applications that are meant to secure users’ privacy online are now found to be exposing their sensitive information to third parties. Security experts...
remote desktop protocol (rdp)

What is an RDP attack?

Remote Desktop Protocol (RDP) attacks are becoming a nightmare for CISOs, CIOs, CTOs, and network administrators. They are an attack vector to enterprise networks....
Mobile Apps Security, mobile apps

How to Secure Your Mobile Apps

Despite multiple security scans, malicious applications make their way into your mobile devices. Most of these unsecured or malicious apps come with several security...
Insider attacker leak data

Insider Threats: A Byproduct of the New Normal

Despite the continuous security improvements, the concern over insider threats seems to be growing for organizations globally. The new distributed working conditions have also...

CSPs Need to Adopt Smarter Ways to Combat Evolving DDoS Attacks

Donny Chong is the Product Director at Nexusguard. He is responsible for designing the company's solutions for the enterprise. His broad ten-year tenure includes...

MOST POPULAR

RECENT POSTS