
The report says 92 percent of companies have cloud credentials for sale on the Dark Web
The report says 92 percent of companies have cloud credentials for sale on the Dark Web
Names, addresses, birthdays, ID, passport numbers, and even travel history are just some of the personal details hackers were able to gain access to when the Cathay Pacific Airways Ltd. was compromised. […]
Acer Security Suite is a complete hardware and software package that encrypts any program file, computer, and user-set passwords and can leverage the trusted platform module technology for secure computing.
Network and endpoint security firm Sophos announced that it has added Endpoint Detection and Response (EDR) to its Intercept X endpoint protection portfolio.
Image from IDC Worldwide spending on security-related hardware, software, and services is forecast to reach $133.7 billion in 2022, according to the new update to the Worldwide Semiannual Security Spending Guide from […]
Image from Pixabay Cybersecurity company Symantec Corp. announced new enhancements to its Data Loss Prevention (DLP) technology to protect information in Office 365. With Symantec DLP, data is protected whether at rest […]
Image from Pixabay In the McAfee Threats Report for September 2018, security researchers highlight the surge of crypto mining malware that started last year and continued in the first half of this […]
Horangi Cyber Security announced that Alex Tran has been appointed vice president of marketing. In his new role, Alex will help Horangi expand its reach into new markets and product pipeline with […]
(Image by Pete Linforth/Pixabay) The average DDoS (distributed denial of service) attack quintupled in size to more than 26 Gbps and the maximum attack size quadrupled to 359 Gbps compared to the […]
(Image from Pixabay) The Kaspersky Lab Global Research and Analysis Team (GReAT) has discovered several infections from a previously unknown Trojan, which is most likely related to the infamous Chinese-speaking threat actor […]
(Image Pixabay) Cloud computing, even with the endless list of its advantages, tops the list of emerging risks in the industry, according to the survey conducted by IT (information and technology) research […]
(Image from Pixabay) Cybersecurity and defense company Trend Micro discovered recently a spam campaign that targets emails that are connected with banks. The malware downloader is disguised as a file extension most […]
(Image from Pixabay) Cybercriminals won’t discriminate on the size of an organization as long as they could obtain data and other information they could use for their crimes. Small and medium enterprises […]
(Image from Pixabay) Device-to-cloud cybersecurity company McAfee announced recently results from its latest survey, The Age of Consent, and found 30 percent of parents post a photo or video of their child […]
In a Gartner report published in July, it says that only 65 percent of organizations have cybersecurity experts in spite of the increasing number of high-profile data breaches worldwide. With cybercrimes on […]
In its recent article, Cybersecurity of the Philippines-CERT (CSP-CERT) illustrates how sextortion scams happen with victims often left helpless and opt to just give in to the criminal’s demand. In CSP-CERT’s explanation, […]
(Image from Pixabay) Instagram (IG) is one of the most popular social networking sites today with one billion monthly users. With the sheer number of accounts, it has become a playground for […]
(Image by Pete Linforth/Pixabay) Worldwide spending on information security products and services will reach more than $114 billion in 2018, an increase of 12.4 percent from last year, according to the latest […]
(Image from Pixabay) A security researcher MalwareHunterTeam discovered a new variant of Matrix Ransomware that can rename encrypted files, according to the report by BleepingComputer. Computers running Remote Desktop Services (RDP) and […]
In the second quarter of 2018, Kaspersky Lab’s anti-phishing technologies prevented over 107 million attempts to visit phishing pages, of which 35.7 percent were related to financial services and targeting customers through […]
(Image by Bethany Drouin/Pixabay) Cloud computing ranks as the top risk concern for executives in risk, audit, finance and compliance, according to the latest survey by Gartner Inc. While cloud computing presents […]
(Image by Gerald Altman/Pixabay) The wave of cyber attacks does not match the number of information security officers (infosec) needed to respond to the crimes. There are more high-profile data breaches reported […]
On July 18, the Cybersecurity Philippines CERT (CSP-Cert) vulnerability research team discovered a number of vulnerabilities in Lenovo Portable Router R2105, which has been discontinued since 2014 and is only available through […]
From left: Julius Suarez, Sophos Asean systems engineer; Margaret Acibron, VP Sales for NetPlay Inc;, Jett Ching, Sophos territory manager for Netplay Inc., William Arnaiz, Globe Business consulting manager, Jojo Rafaeles, Globe […]
(Image by Pete Linforth/Pixabay) Security firm Sophos took a deeper look into the SamSam ransomware and found out that its victims have paid almost $6 million in ransom demands since it began […]
(Image by Pete Linfort/Pixabay) Despite high-profile cyber attacks and massive data breaches happening recently, organizations don’t see the need to have cybersecurity experts onboard. Industry research firm Gartner finds that despite 95 […]
(Image by Pete Linforth/Pixabay) Even cybercriminals upgrade or upcycle ransomware as evidenced by Jigsaw that has reemerged to target the cryptocurrency industry. The ransomware is now known as BitcoinStealer and can wipe […]
(Image by Darwin Laganzon/Pixabay) Recent data breaches, not only in the private sector but in the government as well, raised cybersecurity awareness in the Philippines. While the conversation is still limited to […]
Calisto, a version of the Mac malware called Proton, was discovered only recently but has been around for two years. Security experts say it is already dead at this point but they […]
(Image from Pixabay) Singapore Prime Minister Lee Hsien Loong is among the 1.5 million patients of SingHealth, whose non-medical data were compromised in a cyber attack that was detected on July 4. […]
You must be logged in to post a comment.