Tag: EN

Hackers Weaponizing MSC Files In Targeted Attack Campaign

Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that enable them to perform different administrative tasks on the target system.  By mimicking legitimate files, MSC files can evade various…

Shhh. Did you hear that?

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> It’s Day One of EFF’s summer membership drive for internet freedom! Gather round the virtual campfire because I’ve got special treats and a story for you: New…

UK Retailers Sue Amazon For £1bn Claiming Data Misuse

Independent retailers sue Amazon for £1bn in biggest-ever UK retail case alleging company misused their data to launch rival products This article has been indexed from Silicon UK Read the original article: UK Retailers Sue Amazon For £1bn Claiming Data…

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

The award is an excellent opportunity for us to thank our readers and to recognize the depth of talent of ESET’s security researchers and writers This article has been indexed from WeLiveSecurity Read the original article: WeLiveSecurity wins Best Cybersecurity…

Cloud migration expands the CISO role yet again

The CISO role used to be focused primarily on information security — creating and implementing policies to safeguard an organization’s data and IT infrastructure from cybersecurity threats. However, as organizations rapidly migrate to cloud environments, the responsibilities and challenges for…

GDPR turns six: Expert discusses AI impact

The European Union’s GDPR policy came into effect six years ago. Since then, it has become widely regarded as the standard for data sharing, but the rise of new technology has questioned its suitability and relevance. In this Help Net…

Security providers view compliance as a high-growth opportunity

85% of managed service and security providers face significant challenges maintaining compliance for customers, with lack of resources, expertise, or technology cited as the most common roadblocks to offering managed compliance, according to Apptega. That being said, the survey also…

Growing Cyber Threats Amid Israel-Palestine Tensions

Growing Cyber Threats Focus on Ransomware, Infostealers, and Defacements This blog continues our geopolitical series, highlighting the growing cyber threats during the ongoing Israel-Palestine tensions. Recent months have seen a significant increase in cyberattacks targeting Israeli institutions, with a particular…