Remove CISO Remove Cyber Attacks Remove Information Security Remove Phishing
article thumbnail

Security Affairs newsletter Round 452 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

INC RANSOM ransomware gang claims to have breached Xerox Corp Spotify music converter TuneFab puts users at risk Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania Russia-linked APT28 used new malware in a recent phishing campaign Clash of Clans gamers at risk while using third-party app New Version of Meduza (..)

article thumbnail

GUEST ESSAY: Preparing for the dire cybersecurity consequences of Russia’s invasion of Ukraine

The Last Watchdog

Cyber attack targets. Russia isn’t the only cyber actor increasing its pace of cyber operations during this time. Educate your employees on threats and risks such as phishing and malware. About the essayist: Don Boian is the Chief Information Security Officer at Hound Labs, Inc.,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘The people’ of cybersecurity are its greatest strength and weakness

SC Magazine

Senior security and IT leaders point to employees and their companies’ own supply chains as the source of constant risk of malicious and unintentional vulnerabilities, exacerbated by remote work and cloud-based environments. . Click here to download the full report, “Are people missing from your cybersecurity strategy?”

article thumbnail

Security Researchers Find Nearly 400,000 Exposed Databases

eSecurity Planet

The semi-annual report’s findings quantify the gap between respondents’ readiness for attacks and their probability of being breached. The CRI report surveyed over 3,500 chief information security officers (CISOs), IT professionals and managers from Asia-Pacific, North America, Europe, and South America in the latter part of 2021.

article thumbnail

Red Team vs Blue Team vs Purple Team: Differences Explained

eSecurity Planet

Blue team members might be led by a chief information security officer (CISO) or director of security operations, making this team the largest among the three. Blue teams tend to be larger because they must prevent all attacks, while red teams may simply select a few specific attacks to pursue.

article thumbnail

We can attract more women by busting the ‘hoodie’ stereotype

SC Magazine

Like many CISOs over the past year, I’ve seen the widespread and sudden transition to remote working complicate processes and introduce weak spots, making organizations vulnerable in brand new ways. As a result, there has been a marked increase in cyber attacks on cloud infrastructure as well as a rise in phishing attempts.

CISO 55
article thumbnail

GUEST ESSAY: 6 steps any healthcare organization can take to help mitigate inevitable cyber attacks

The Last Watchdog

Many security programs focus on employee education (creating a strong password, being aware of phishing, etc.). Increasing security savvy at home can motivate employees to go further to protect your organization’s network and the customer information on it. These six areas will help improve your security program.