Cyber Security Ransomware — Encrypt Your Data Before Others Do Mar 7, 2022 cyberdefensemagazine.com Don’t let them look at your data. By Robert Freudenreich, CTO and Founder, Secomba GmbH | Boxcryptor A […] The…
Cyber Security Industrial Systems See More Vulnerabilities, Greater Threat Mar 7, 2022 darkreading.com The makers of operational technology and connected devices saw reported vulnerabilities grow by half in 2021, but other trends may…
Cyber Security The Role of The CFO In Enterprise Cyber Security Mar 5, 2022 cyberdefensemagazine.com By Glenn Murray, CEO at Sapien Cyber Who is responsible for cyber security in your organization? Smart businesses […] The…
Cyber Security The Fragility of a GPS Centric World and the Importance of eLORAN Mar 5, 2022 cyberdefensemagazine.com By Dan Dickey, President, Continental Electronics Corporation Both the importance of GPS systems and their vulnerability to a […] The…
Cyber Security Why Changing Classified Document Status Can Affect Risk Levels and How Proactive Cybersecurity Methods Can Help Mar 4, 2022 cyberdefensemagazine.com By Sam Hutton, SVP, Glasswall As ransomware attacks, insider threats, data breaches and phishing attacks against government agencies […] The…
Cyber Security Protecting Field Programmable Gate Arrays From Attacks Mar 2, 2022 darkreading.com FPGAs can be part of physical systems in the aerospace, medical, or industrial fields, so a security compromise can be…
Technology Hackers to NVIDIA: Remove mining cap or we leak hardware data Feb 28, 2022 bleepingcomputer.com The Lapsus$ data extortion group has released what they claim to be data stolen from the Nvidia GPU designer. The…
Technology Ukraine says its ‘IT Army’ has taken down key Russian sites Feb 28, 2022 bleepingcomputer.com Key Russian websites and state online portals have been taken offline by attacks claimed by the Ukrainian cyber police force,…
Technology Ukraine recruits “IT Army” to hack Russian entities, lists 31 targets Feb 26, 2022 bleepingcomputer.com Ukraine is recruiting a volunteer "IT army" of security researchers and hackers to conduct cyberattacks on thirty-one Russian entities, including…
Technology Jester Stealer malware adds more capabilities to entice hackers Feb 25, 2022 bleepingcomputer.com An infostealing piece of malware called Jester Stealer has been gaining popularity in the underground cybercrime community for its functionality…
Ransomware — Encrypt Your Data Before Others Do
Don’t let them look at your data. By Robert Freudenreich, CTO and Founder, Secomba GmbH | Boxcryptor A […] The…
Industrial Systems See More Vulnerabilities, Greater Threat
The makers of operational technology and connected devices saw reported vulnerabilities grow by half in 2021, but other trends may…
The Role of The CFO In Enterprise Cyber Security
By Glenn Murray, CEO at Sapien Cyber Who is responsible for cyber security in your organization? Smart businesses […] The…
The Fragility of a GPS Centric World and the Importance of eLORAN
By Dan Dickey, President, Continental Electronics Corporation Both the importance of GPS systems and their vulnerability to a […] The…
Why Changing Classified Document Status Can Affect Risk Levels and How Proactive Cybersecurity Methods Can Help
By Sam Hutton, SVP, Glasswall As ransomware attacks, insider threats, data breaches and phishing attacks against government agencies […] The…
Protecting Field Programmable Gate Arrays From Attacks
FPGAs can be part of physical systems in the aerospace, medical, or industrial fields, so a security compromise can be…
Hackers to NVIDIA: Remove mining cap or we leak hardware data
The Lapsus$ data extortion group has released what they claim to be data stolen from the Nvidia GPU designer. The…
Ukraine says its ‘IT Army’ has taken down key Russian sites
Key Russian websites and state online portals have been taken offline by attacks claimed by the Ukrainian cyber police force,…
Ukraine recruits “IT Army” to hack Russian entities, lists 31 targets
Ukraine is recruiting a volunteer "IT army" of security researchers and hackers to conduct cyberattacks on thirty-one Russian entities, including…
Jester Stealer malware adds more capabilities to entice hackers
An infostealing piece of malware called Jester Stealer has been gaining popularity in the underground cybercrime community for its functionality…