Size Doesn’t Matter to Cybercriminals.

More and more, the victims of cybercrime aren’t big businesses, they’re SMEs. If you’re an SME, there’s a real and present danger of cyber attack. More than half of all attacks on businesses are against SMEs. What makes that figure…

The Human Factor

In terms of technology, humans are in a race to incorporate the newest and popular items and solutions into our life. We will queue for hours in order to be the first to get a new phone when it is…

Latest email security trends in phishing in 2022

Although it's important to be optimistic for 2022, it's tough to deny that the major obstacles the world has faced since the outbreak are still present. In a world where an ever-increasing percentage of the workforce is transitioning to working…

Be Proactive in the Face of Growing Cyber Security Concerns

There has been an increase in cyberattacks in the last few months. There are a few publicly available resources where you can guarantee that you're up to date on what's going on in the cyber world. Among them are:

Hackers Are Selling a Critical Zoom Zero-Day Exploit for $500,000

By Lorenzo Franceschi-Bicchierai , Source: Motherboad, Tech by VICE Hackers are selling two critical vulnerabilities for the video conferencing software Zoom that would allow someone to hack users and spy on their calls, Motherboard has learned. The two flaws are…

Vietnam-linked hackers targeted Chinese government over coronavirus response: researchers

By: Jack Stubbs, Raphael Satter Additional reporting by Muyu Xu in Beijing and James Pearson in Hanoi; Editing by Richard Chang  Source: Reuters LONDON/WASHINGTON (Reuters) - Hackers working in support of the Vietnamese government have attempted to break into Chinese…

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Source: krebsonsecurity The U.S. Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly…

Database Architecture And Security

Security Architecture An essential but often missing element in an information security program is a well-defined and complete information security architecture that reflects the business decisions and the information security policy decisions of the organization. In many cases, the security…

The Cyber Kill Chain or: how I learned to stop worrying and love data breaches

Pulling off a heist is no easy feat – and in order to prevent theft, you best understand the plan of attack. Like any good ol’ traditional heist, there are multiple stages to consider in a cyber-attack. To help prevent…