Category: EN

FTC Findings on Commercial Surveillance Can Lead to Better Alternatives

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> On September 19, the FTC published a staff report following a multi-year investigation of nine social media and video streaming companies. The report found a myriad of…

Secure Organizations by Thinking Like a Hacker

Introducing the Cisco Certificate in Ethical Hacking, a new program to recognize candidates who have completed a 2-part training requirement; a.) a training course on ethical hacking, penetration testing, red teaming tactics, and advanced threat response, and b.) demonstrated their…

The X Corp. Shutdown in Brazil: What We Can Learn

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> The feud between X Corp. and Brazil’s Supreme Court continues to drag on: After a month-long standoff, X Corp. folded and complied with court orders to suspend several accounts, name a…

American Water Hit by Cyberattack, Billing Systems Disrupted

American Water, the largest water utility in the US, discovered a cyber-attack impacting internal systems on October 3 This article has been indexed from www.infosecurity-magazine.com Read the original article: American Water Hit by Cyberattack, Billing Systems Disrupted

Lua Malware Targeting Student Gamers via Fake Game Cheats

Morphisec Threat Labs uncovers sophisticated Lua malware targeting student gamers and educational institutions. Learn how these attacks work… This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: Lua Malware Targeting…

Cloud Security Assessment: Checklist to Ensure Data Protection

The adoption of cloud computing has become a cornerstone of modern business operations today. However, this shift brings forth significant concerns about data protection and security. Cloud security assessment plays a crucial role in safeguarding sensitive information and ensuring compliance…