Cybersecurity

CISO Perspectives on Complying with Cybersecurity Regulations

Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the...

Vietnam-Based Hackers Steal Financial Data Across Asia with Malware

A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed to harvest valuable...

Google Patches Pixel Phone Zero-days After Exploitation by “Forensic Companies”

Google has issued a security advisory to owners of its Android Pixel smartphones, warning that it has discovered someone has been targeting some...

Fake Lawsuit Threat Exposes Privnote Phishing Sites – Krebs on Security

A cybercrook who has been setting up websites that mimic the self-destructing message service privnote.com accidentally exposed the breadth of their operations recently...

Cyberattack forces Omni Hotels to shut down its IT systems

As the Omni online systems were out, the company resorted to an offline mode of running critical business operations, including manual check-ins. “Checking...

Recent Articles