CISO MAG Cyber Monday Deals
  • Cyber Monday Deals
Home Tags Cyberattacks

Tag: Cyberattacks

Web Application Attacks Increases 8x in H1 2020

A cybersecurity report from cloud security provider CDNetworks revealed that distributed denial-of-service (DDoS), web application, and botnet attacks have surged exponentially in H1 2020...

Mobile Malware Skyrockets in Asia, 97% of Transactions Found Fraudulent

A new report from Upstream’s Secure-D highlighted the consistent increase in mobile malware activity in Asia in Q3 2020. It revealed that 97% of...

Find the Fake! FBI Warns About Spoofed Website Domain Names

The FBI is warning users to be vigilant about fraudulent websites impersonating FBI-related domain names. In a security release, the FBI stated that it...

Chinese E-Commerce Scammers Trade Customer PII and Payment Card Data on...

A Chinese e-commerce cyber-espionage campaign is suspected to be illicitly collecting payment information of unwitting consumers via hundreds of fraudulent e-commerce websites that appear...

How Cybercriminals Abuse AI and ML for Launching Sophisticated Cyberattacks

Threat actors can misuse advanced technologies like Artificial Intelligence (AI) and Machine Learning (ML) to launch sophisticated cyberattacks and invent new kinds of malicious...

Artificial Intelligence in Cybersecurity Operations

The attack surface is rapidly expanding and continues to evolve at an unprecedented pace. Cyberattacks are becoming more sophisticated and are proliferating at lightning...

Web Hosting Provider Managed.com Suffers Ransomware Attack

Managed web hosting provider Managed.com has temporarily taken down its servers and web hosting systems after suffering a suspected ransomware attack. In a security...

The Right Data Integrity Approach Will Ramp Up Your Cyber Protection...

Way back in 2018, cyber threats were prevalent, but those were simple attacks that penetrated the data center and randomly encrypted data, holding it...

Ransomware Attacks Continue to Impact Digital and Security Transformation

A recent survey from CrowdStrike highlighted the continued spread of ransomware and the need for acceleration of both digital and security transformation. In its...

Cybercriminals Move to Cloud! Hackers Selling Credentials via “Cloud of Logs”

A new research from Trend Micro revealed that cybercriminals are using cloud services to accelerate their attacks, in turn decreasing the amount of time...

EXCLUSIVE

MOST POPULAR

RECENT POSTS