#hacking-threats

[ follow ]
#cybersecurity
ITPro
2 weeks ago
Information security

How hackers target the cloud

Cloud vulnerabilities, particularly misconfigurations, present significant security risks for businesses, making awareness and proactive measures essential to protect valuable assets. [ more ]
CyberScoop
1 month ago
Information security

North Korean hacking group makes waves to gain Mandiant, FBI spotlight

APT45, a North Korean hacking group, has escalated its activities, prompting Mandiant to designate it as a top-tier threat targeting defense, research, finance, healthcare, and energy sectors. [ more ]
ComputerWeekly.com
4 months ago
Privacy professionals

GCHQ to protect politicians and election candidate's from cyber-attacks | Computer Weekly

Protection offered against phishing and malware attacks to high-risk individuals before the next general election. [ more ]
ITPro
2 weeks ago
Information security

How hackers target the cloud

Cloud vulnerabilities, particularly misconfigurations, present significant security risks for businesses, making awareness and proactive measures essential to protect valuable assets. [ more ]
CyberScoop
1 month ago
Information security

North Korean hacking group makes waves to gain Mandiant, FBI spotlight

APT45, a North Korean hacking group, has escalated its activities, prompting Mandiant to designate it as a top-tier threat targeting defense, research, finance, healthcare, and energy sectors. [ more ]
ComputerWeekly.com
4 months ago
Privacy professionals

GCHQ to protect politicians and election candidate's from cyber-attacks | Computer Weekly

Protection offered against phishing and malware attacks to high-risk individuals before the next general election. [ more ]
morecybersecurity
TNW | Data-Security
6 months ago
Privacy professionals

Hackers are hunting celebs. Digital IDs can help, but add new risks

High-profile individuals like the Royal Family are vulnerable to hackers who can exploit sensitive data for various malicious purposes.
Decoupling digital identity from institutions through decentralized identity may enhance data security for high-profile individuals. [ more ]
[ Load more ]