Risk Assessment: NIST 800-30 vs ISO/IEC 27005Security risk assessment is one of the key phases of the risk management process. Above all, it refers to the... BLOG Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective... Czech Republic’s Hospital is Hit by Cyberattack Amid Pandemic March 18, 2020 The Brno University Hospital in the city of Brno, the Czech Republic suffered a cyber attack during a COVID-19 outbreak.... North Korea is Reusing Malware! What Does This Mean? February 29, 2020 Among the hacking groups from North Korea, there is a group called Lazarus has plundered and pillaged the global internet,... Iranian Hacking Group Targets Universities September 20, 2019 The Cobalt Dickens hacking group run out of Iran is targeting universities in a global phishing campaign. The group, linked... Snapchat Employees Spy on Users May 31, 2019 Snapchat employees were abusing their power to spy on users. Employees used internal tools to access private user data. They... WireLurker: A Revolutionary Malware Targeting Apple iOS Devices November 6, 2014 Do you own an Apple device? If so, you need to read this to minimize the risks of getting infected by this revolutionary malware that infected hundreds of thousands of users already.
Risk Assessment: NIST 800-30 vs ISO/IEC 27005Security risk assessment is one of the key phases of the risk management process. Above all, it refers to the...
BLOG Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective... Czech Republic’s Hospital is Hit by Cyberattack Amid Pandemic March 18, 2020 The Brno University Hospital in the city of Brno, the Czech Republic suffered a cyber attack during a COVID-19 outbreak.... North Korea is Reusing Malware! What Does This Mean? February 29, 2020 Among the hacking groups from North Korea, there is a group called Lazarus has plundered and pillaged the global internet,... Iranian Hacking Group Targets Universities September 20, 2019 The Cobalt Dickens hacking group run out of Iran is targeting universities in a global phishing campaign. The group, linked... Snapchat Employees Spy on Users May 31, 2019 Snapchat employees were abusing their power to spy on users. Employees used internal tools to access private user data. They... WireLurker: A Revolutionary Malware Targeting Apple iOS Devices November 6, 2014 Do you own an Apple device? If so, you need to read this to minimize the risks of getting infected by this revolutionary malware that infected hundreds of thousands of users already.
Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective...
Czech Republic’s Hospital is Hit by Cyberattack Amid Pandemic March 18, 2020 The Brno University Hospital in the city of Brno, the Czech Republic suffered a cyber attack during a COVID-19 outbreak....
North Korea is Reusing Malware! What Does This Mean? February 29, 2020 Among the hacking groups from North Korea, there is a group called Lazarus has plundered and pillaged the global internet,...
Iranian Hacking Group Targets Universities September 20, 2019 The Cobalt Dickens hacking group run out of Iran is targeting universities in a global phishing campaign. The group, linked...
Snapchat Employees Spy on Users May 31, 2019 Snapchat employees were abusing their power to spy on users. Employees used internal tools to access private user data. They...
WireLurker: A Revolutionary Malware Targeting Apple iOS Devices November 6, 2014 Do you own an Apple device? If so, you need to read this to minimize the risks of getting infected by this revolutionary malware that infected hundreds of thousands of users already.