Ransomware Vulnerabilities 5 Industries That Need the Most Cybersecurity Practices With the advancements in technology every year, the need for protection against… cybersecurityredflag_sdevzwAugust 17, 2021
Uncategorized Estonian Hacker Steals 300,000 Government ID Photos Estonia’s electronic ID system was hacked last week. Again. A suspect is in… cybersecurityredflag_sdevzwJuly 30, 2021
Malware Israeli Government Agencies Visit NSO Group Offices Authorities opened an investigation into the secretive Israeli security firm. cybersecurityredflag_sdevzwJuly 29, 2021
Cyber Attacks Facebook fires 52 employees for abusing their access to stealing user data and spying multiple women profiles and location Facebook announced its decision to fire 52 employees for using their privileged… cybersecurityredflag_sdevzwJuly 15, 2021
Malware Trickbot Malware Rebounds with Virtual-Desktop Espionage Module The attackers have spruced up the ‘vncDll’ module used for spying on… cybersecurityredflag_sdevzwJuly 14, 2021
Cyber Attacks FBI requires USA Today to hand over names and IP addresses of its readers to investigate criminal case Technological resources have become a fundamental tool for the investigation of many… cybersecurityredflag_sdevzwJune 7, 2021
Malware Apple Patches Zero-Day Flaw in MacOS that Allows for Sneaky Screenshots Security researchers at Jamf discovered the XCSSET malware exploiting the vulnerability, patched… cybersecurityredflag_sdevzwMay 25, 2021
Ransomware Here’s the breakdown of cybersecurity stats only law firms usually see Image of the Washington, D.C. office of law firm BakerHostetler. In a… cybersecurityredflag_sdevzwMay 6, 2021
Cyber Attacks Malware The 15 biggest data breaches of the 21st century Not long ago, a breach that compromised the data of a few… cybersecurityredflag_sdevzwJanuary 8, 2021
Cyber Attacks 12 new state privacy and security laws explained: Is your business ready? While at the federal level security and privacy legislation are lost in… cybersecurityredflag_sdevzwDecember 28, 2020