News
-
"Improving Security as Artificial Intelligence Moves to Smartphones"Devices such as smartphones, security cameras, and speakers, will soon rely more on artificial intelligence to increase the speed at which speech and images are processed. A compression technique, called quantization, reduces the size of deep learning…
-
Cyber Scene #32 - Globalized Tech: Tightropes EverywhereCyber Scene #32 Globalized Tech: Tightropes Everywhere
-
"LinkedIn Data Found in Unsecured Databases"LinkedIn used eight unsecured databases which held approximately 60 million records of LinkedIn user information. The unsecured data contained: LinkedIn profile information, including IDs, profile URLs, work history, education history,…
-
"6 Takeaways from Ransomware Attacks in Q1"Although there has been a decrease in the number of ransomware attacks, the intensity of such attacks have grown in that ransom payments are higher, downtime loss is greater, and the recovery time is longer. According to a new report released by…
-
"Security Culture Questions to Consider"In order for enterprises to more effectively mitigate cybersecurity weaknesses, a security culture must be fostered within the workplace through the use of tools, training, and other technology aids. Enterprise security culture is an essential part of…
-
"How an Annual ‘Cyber Shield’ Drill Helps the National Guard Secure Elections"Cyber Shield is an Army National Guard exercise aimed at testing and enhancing the cyber incident-response capabilities of the Guard. Participants of this year's exercise include National Guard units from 40 states, those working in the private…
-
"Microsoft email breach gave hackers access to account information for months"Microsoft has been affected by a data breach involving attackers leveraging a customer support account to access customers’ email information. Microsoft-managed email services such as @Outlook.com, @MSN.com and @Hotmail.com were affected by the…
-
"Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds"A report recently released by Sophos, titled “Exposed: Cyberattacks on Cloud Honeypots”, highlights the speed at which a cloud server honeypot was attacked by cybercriminals, the average number of attempted attacks on cloud servers per minute, and more.…
-
"DevSecOps: Fast Development Without Sacrificing Safety"DevOps is a set of practices that have been increasingly adopted by organizations to increase the speed at which software is developed and delivered. However, organizations are encouraged to adopt DevSecOps in which security is considered at every stage…
-
"Cyberspies Hijacked the Internet Domains of Entire Countries"A hacker group, called Sea Turtle, has been discovered by researchers at Cisco's Talos security devision to be carrying out an espionage campaign primarily targeting government organizations in the Middle East and North Africa, including intelligence…
-
"Malvertising Campaign Abducts Half a Billion Chrome on iOS Sessions to Push Fake Ads"Confidant, an IT security firm, recently published a blog post in which the details of a malvertising campaign, dubbed eGobbler, are presented. According to researchers, eGobbler, abused a vulnerability in Chrome for iOS. Through the exploitation of this…
-
"Army Researchers Identify New Way to Improve Cybersecurity"Cyberattacks pose a significant threat to the security and privacy of individuals, government agencies, and businesses, making cybersecurity one of the biggest concerns of the nation. A new way in which network security can be improved has been…