Search Results for: credit report Blog Post 29,000 U.S. Facebook Employees’ Payroll Info Was Compromised December 24, 2019 On November 17, Facebook Inc.’s finance officer’s car was robbed by breaking the car window. Several hard drives that contain... Blog Post Hacker-For-Hire Continues To Exploit Entities Around The Globe January 11, 2022 Information about a well-known hacker-for-hire company that continues to exploit entities was released recently. Since its commencement in 2015, the... Blog Post US settlement reached over YouTube children’s privacy breaches July 22, 2019 The US Federal Trade Commission has voted to approve a potentially multimillion-dollar settlement with Google over the violation of children’s... Blog Post Small Banks are a Step Behind Ransomware Groups, Seek Help from Congress December 1, 2021 Ransomware attacks on smaller, community banks in the US have ramped up in recent years, putting the financial data of... Blog Post Over 40 Million T-Mobile Customers’ Data Stolen September 15, 2021 Over the weekend in mid-August, a supposed hacker bragged in online forums about having successfully carried out a data breach... Blog Post The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding... Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Blog Post Lack of Visibility into Key Security Controls is a Big Problem for Cybersecurity Teams August 7, 2020 The 2020 State of Enterprise Security Posture Report published findings that are concerning for the overall cybersecurity of organizations. It... Blog Post Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing... Blog Post €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to... Blog Post Roger Ransomware October 1, 2020 Roger ransomware belongs to the CrySIS/Dharma family. It got its name out of the .ROGER extension it usually adds to... Blog Post The Increasing Shortage of Cybersecurity Professionals June 4, 2020 In fact, the shortage of qualified cybersecurity employees is the biggest cyber risk. A report released by Cybersecurity Ventures in... Blog Post Fake Job Postings Trick Applicants! February 6, 2020 What are Job Scams?? Cybercriminals attempt job scams by presenting themselves as authorized Employers or employment agencies to convince victims... Blog Post OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration August 6, 2020 A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack...
Blog Post 29,000 U.S. Facebook Employees’ Payroll Info Was Compromised December 24, 2019 On November 17, Facebook Inc.’s finance officer’s car was robbed by breaking the car window. Several hard drives that contain...
Blog Post Hacker-For-Hire Continues To Exploit Entities Around The Globe January 11, 2022 Information about a well-known hacker-for-hire company that continues to exploit entities was released recently. Since its commencement in 2015, the...
Blog Post US settlement reached over YouTube children’s privacy breaches July 22, 2019 The US Federal Trade Commission has voted to approve a potentially multimillion-dollar settlement with Google over the violation of children’s...
Blog Post Small Banks are a Step Behind Ransomware Groups, Seek Help from Congress December 1, 2021 Ransomware attacks on smaller, community banks in the US have ramped up in recent years, putting the financial data of...
Blog Post Over 40 Million T-Mobile Customers’ Data Stolen September 15, 2021 Over the weekend in mid-August, a supposed hacker bragged in online forums about having successfully carried out a data breach...
Blog Post The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding...
Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the...
Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
Blog Post Lack of Visibility into Key Security Controls is a Big Problem for Cybersecurity Teams August 7, 2020 The 2020 State of Enterprise Security Posture Report published findings that are concerning for the overall cybersecurity of organizations. It...
Blog Post Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing...
Blog Post €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to...
Blog Post Roger Ransomware October 1, 2020 Roger ransomware belongs to the CrySIS/Dharma family. It got its name out of the .ROGER extension it usually adds to...
Blog Post The Increasing Shortage of Cybersecurity Professionals June 4, 2020 In fact, the shortage of qualified cybersecurity employees is the biggest cyber risk. A report released by Cybersecurity Ventures in...
Blog Post Fake Job Postings Trick Applicants! February 6, 2020 What are Job Scams?? Cybercriminals attempt job scams by presenting themselves as authorized Employers or employment agencies to convince victims...
Blog Post OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration August 6, 2020 A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack...