Companies have a long road ahead to protect privileged identities and access, despite corporate leaders’ good intentions. Less than half of the organizations surveyed by Delinea have implemented ongoing security policies and processes for privileged access management.

Amazon alleges that the administrators of more than 10,000 Facebook groups have attempted to orchestrate the placement of bogus reviews on Amazon in exchange for money or free products.

Digital devices and home networks of corporate executives, board members and high-value employees with access to financial, confidential and proprietary information are ripe targets for malicious actors, according to a study released Tuesday by a cybersecurity services firm. The connected home is a ...

New research from Atlas VPN shows that cloud-native exploits on major cloud service providers (CSPs) declined during the first four months of 2022. Cloud-native exploits dropped by 25%, from 71 exploits in the first four months of 2021 to 53 exploits in the first four months of this year, Atlas rese...

The social media platform for professionals was in the crosshairs of 52 percent of all phishing scams globally in the first quarter of 2022. This is the first time that hackers leveraged LinkedIn more often than any tech giant brand name like Apple, Google, and Microsoft.

Research by a cybersecurity services provider reveals how widespread the risks are to executives and the organizations they ramrod from data brokers collecting sensitive data about them. "We see corporate executives targeted all the time in their personal lives," BlackCloak Founder and CEO Chris Pie...

The massive takedown of RaidForums might have little real impact against the large volume of hackers operating worldwide, since many of Raid's members could flock to alternative platforms.

Forrester also called out the work-from-anywhere trend as a major threat in 2022. It explained that an anywhere-work model presents an opportunity to create new kinds of sensitive data.

SPOTLIGHT ON SECURITY

Beware the Ides of March Madness

This annual event is a most-popular time for betting pools and bracket challenges -- when employees often use websites, online platforms, or shared spreadsheets to organize. Hackers have countless ways to entice you to engage with them. These ruses include the promise of bigger winnings or insider i...

Internal documents recently leaked by a member of the Conti ransomware group reveal the gang's status as a multi-layered business organization. These chat logs present a deep dive into the gang's revenue numbers, leaders, recruiting practices and operations, and victims.

Government agencies have discovered a deadlier new home and office network device killer malware that replaces weaker VPNFilter code. U.S. and U.K. governments published a joint report Wednesday detailing a new malware strain developed by Russia's military cyber unit deployed in the wild since 2019....

Russian state-sponsored cybercriminals lurked for the last two years in numerous U.S Cleared Defense Contractors' networks stealing sensitive, unclassified information along with proprietary and export-controlled technology. The Federal Bureau of Investigation, Cybersecurity and Infrastructure Secur...

Consumers, especially lonely hearts experiencing life's so-called golden years, are prime targets for romance scams and fraud assaults. Romance scams are at an all-time high. Even younger folks who share too much about their affairs of the heart on dating sites and social media could become ripe tar...

Brace yourself, 2022 promises to bring expanded cyber confrontations as ransomware attacks gain the high ground. A dangerous increase in ransomware attacks last year caused devastating compromises to government organizations, critical infrastructure, and businesses. Much of the increase resulted fro...

Will Elon Musk ultimately purchase Twitter?
Loading ... Loading ...

E-Commerce Times Channels