Category: CyberSecurity-Insiders

How to Comply with the U.S. Federal Trade Commission's (FTC) revised Safeguards Rule
28
Mar
2023

How to Comply with the U.S. Federal Trade Commission’s (FTC) revised Safeguards Rule

If you handle consumer financial data, you need to be aware of the U.S. Federal Trade Commission‘s (FTC) revised Safeguards Rule cybersecurity regulation….

Romance scams loss termed to have reached £10k on an average in UK
28
Mar
2023

Romance scams loss termed to have reached £10k on an average in UK

A report compiled by Barclays states that the amount of money lost in romance scams has reached an average of…

Source Code of Twitter leaked on GitHub
27
Mar
2023

Source Code of Twitter leaked on GitHub

Twitter issued a public statement stating that parts of its source code were leaked on GitHub and that its officials…

Women in Cybersecurity – History to Today
27
Mar
2023

Women in Cybersecurity – History to Today

[ This article was originally published here ] This March, Women’s History Month, we shared and her trailblazing innovations in…

How often should security audits be?
27
Mar
2023

How often should security audits be?

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

ChatGPT users data leaked because of bug vulnerability
27
Mar
2023

ChatGPT users data leaked because of bug vulnerability

OpenAI-developed ChatGPT has hit the news headlines because user information has been leaked on the web by some threat actors…

Artificial Intelligence vs Machine Learning: Understanding the Differences
27
Mar
2023

Artificial Intelligence vs Machine Learning: Understanding the Differences

Artificial intelligence (AI) and machine learning (ML) are two terms that are often used interchangeably, but they are not the…

New Report on Current and Emerging Cyber Threats to Healthcare
25
Mar
2023

New Report on Current and Emerging Cyber Threats to Healthcare

Health-ISAC, a nonprofit, private sector, member-driven organization, has released its annual cyber threat report on current and emerging threat activity…

Killnet targeting healthcare apps hosted on Microsoft Azure
24
Mar
2023

Killnet targeting healthcare apps hosted on Microsoft Azure

Microsoft has detected that a Russian-affiliated hacking group dubbed Killnet has been targeting healthcare apps being hosted on the Azure…

Analysis: Will ChatGPT’s Perfect English Change the Game For Phishing Attacks?
24
Mar
2023

Analysis: Will ChatGPT’s Perfect English Change the Game For Phishing Attacks?

[ This article was originally published here ] By John E. Dunn  Nobody predicted how rapidly AI chatbots would change…

LATEST CYBERTHREATS AND ADVISORIES - MARCH 24, 2023
24
Mar
2023

LATEST CYBERTHREATS AND ADVISORIES – MARCH 24, 2023

[ This article was originally published here ] By John Weiler   FBI arrests Breached hacking forum leader, smartphones hijacked without…

Why Access Control Should Be a Core Focus for Enterprise Cybersecurity
24
Mar
2023

Why Access Control Should Be a Core Focus for Enterprise Cybersecurity

By Gal Helemski, co-founder and CTO, The number of access rules that must be managed across directories, applications, repositories, and…