#COVID19 Phishing Emails Surge 500% on Omicron Concerns
#COVID19 Phishing Emails Surge 500% on Omicron Concerns The latest COVID-19 variant has led to a 521% increase in phishing attacks using the virus as...
Security hygiene and posture management: A 2022 priority
While cybersecurity is complex and multifaceted, security certifications (i.e., CISSP common body of knowledge 8 domains), regulations (i.e., HIPAA, PCI DSS, etc.), and best practices...
Security hygiene and posture management: A 2022 priority
While cybersecurity is complex and multifaceted, security certifications (i.e., CISSP common body of knowledge 8 domains), regulations (i.e., HIPAA, PCI DSS, etc.), and best practices...
Merck Wins $1.4bn NotPetya Payout from Insurer
Merck Wins $1.4bn NotPetya Payout from Insurer Merck has won a long-running legal battle to force its insurer to cover the costs of damages caused...
Footprinting
The first step in a cyberattack, or a penetration test, is footprinting. The attacker/analyst tries to get information about the targeted infrastructure. Thanks to footprinting...
Cyberbullying: Words do Hurt When it Comes to Social Media
Most parents may find it difficult to relate to today’s form of cyberbullying. That’s because, for many of us, bullying might have come in a...
Biden Signs Memo to Boost National Cybersecurity
Biden Signs Memo to Boost National Cybersecurity United States President Joe Biden has signed a National Security Memorandum (NSM) requiring national security systems to implement...
11:11 Systems Acquires iland
11:11 Systems Acquires iland Managed infrastructure solutions company, 11:11 Systems, has acquired Texas-based cloud services provider, iland. The completion of the acquisition was announced on Thursday. The terms of...
Third Firmware Bootkit Discovered
Third Firmware Bootkit Discovered Cybersecurity researchers at Kaspersky have discovered a third known case of a firmware bootkit in the wild. The kit, which made its first...
CIS Risk Assessment Method (RAM) v2.1 for Implementation Group 2 (IG2)
CIS Risk Assessment Method v2.1 for IG2 is designed to help justify investments for reasonable implementation of the CIS Critical Security Controls (CIS Controls). Read...