A transformative journey

A transformative journey

A transformative journey | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message…

Read More

Hackers Try to Target European Officials to Get Info on Ukrainian Refugees, Supplies

Hackers Try to Target European Officials to Get Info on Ukrainian Refugees, Supplies

Details of a new nation-state sponsored phishing campaign have been uncovered setting its sights on European governmental entities in what’s seen as an attempt to obtain intelligence on refugee and supply movement in the region. Enterprise security company Proofpoint, which detected the malicious emails for the first time on February 24, 2022, dubbed the social engineering attacks “Asylum Ambuscade.” “The email included a malicious macro attachment which utilized social engineering themes pertaining to the Emergency…

Read More

Wiperware (pseudo ransomware) used in Ukraine cyberattacks

Wiperware (pseudo ransomware) used in Ukraine cyberattacks

Wiperware (pseudo ransomware) used in Ukraine cyberattacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Colonial Pipeline names Adam Tice Chief Information Security Officer

Colonial Pipeline names Adam Tice Chief Information Security Officer

Colonial Pipeline names Adam Tice Chief Information Security Officer | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Ukrainian government and banks affected by cyberattacks

Ukrainian government and banks affected by cyberattacks

Ukrainian government and banks affected by cyberattacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Meyer suffers cyberattack by Conti ransomware gang

Meyer suffers cyberattack by Conti ransomware gang

Meyer suffers cyberattack by Conti ransomware gang | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Betsy Soehren-Jones joins Fortress Information Security as COO

Betsy Soehren-Jones joins Fortress Information Security as COO

Betsy Soehren-Jones joins Fortress Information Security as COO | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Why industry experts recommend tabletop cybersecurity exercises

Why industry experts recommend tabletop cybersecurity exercises

Why industry experts recommend tabletop cybersecurity exercises | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Cleared defense contractors: 10 steps to reduce cyber risk

Cleared defense contractors: 10 steps to reduce cyber risk

Cleared defense contractors: 10 steps to reduce cyber risk | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

US enterprises at risk; Russian cyberattacks could disrupt public safety, critical infrastructure

US enterprises at risk; Russian cyberattacks could disrupt public safety, critical infrastructure

US enterprises at risk; Russian cyberattacks could disrupt public safety, critical infrastructure | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More
1 12 13 14 15 16 35