• Home
  • Security Events
  • Security Videos
  • Advertise with us
  • Submit your event
Log inRegister
Login
Register

Sidebar

  • Start
    • About us
    • Cookie Usage Policy
    • Contact Us
    • News Letter
    • Search
    • Privacy Policy
  • Becoming a CISSP
    • The CISSP Examination
    • CISSP Certification FAQ
    • CISSP Code of Ethics
    • Free CISSP Exam Practice tests
  • Security Certifications
    • CISM Certification
    • CISA Certification
    • CEH Certification
    • CHFI Certification
    • CRISC Certification
  • Security Jobs
    • Jobs
    • Categories
    • Search
    • Companies List
  • Professional Networking
    • Friends
      • All Friends
      • Request Sent
      • Pending my approval
    • Profile
      • Change Profile Picture
      • Change Profile Video
      • Edit Profile
      • Edit Details
      • Privacy Settings
      • Preferences
      • Customize My Page
      • Notifications
    • Groups
    • Photos
    • Members
      • All Members
      • Advanced Search
    • Register
  • Security News
    • Financial Security
    • Thought Leadership
    • State Security
    • Healthcare Security
    • Mobile Security
    • Computer Forensics
CISSP.COM CISSP.COM CISSP.COM The Web Portal for Security Professionals

16
Fri, May
  • Start
    • About us
    • Cookie Usage Policy
    • Contact Us
    • News Letter
    • Search
    • Privacy Policy
  • Becoming a CISSP
    • The CISSP Examination
    • CISSP Certification FAQ
    • CISSP Code of Ethics
    • Free CISSP Exam Practice tests
  • Security Certifications
    • CISM Certification
    • CISA Certification
    • CEH Certification
    • CHFI Certification
    • CRISC Certification

    Certifications

    • CISSP Certification
      Details

      About The CISSP Certification

    • CEH Certification
      Details

      Certified Ethical Hacker Certification

    • CRISC Certification
      Details

      Certified in Risk and Information Systems Control

    • CISM Certification
      Details

      Certified Information Security Manager Certification

    • CISA Certification
      Details

      Certified Information Systems Auditor Certification

    • CISSP Certification
      Details

      CISSP Certification FAQs

    • CHFI Certification
      Details

      Computer Hacking Forensic Investigator Certification

    • CISSP Certification
      Details

      Free CISSP Practice exams

    • CISM Certification
      Details

      ISACA Code of Professional Ethics

  • Security Jobs
    • Jobs
    • Categories
    • Search
    • Companies List
  • Professional Networking
    • Friends
      • All Friends
      • Request Sent
      • Pending my approval
    • Profile
      • Change Profile Picture
      • Change Profile Video
      • Edit Profile
      • Edit Details
      • Privacy Settings
      • Preferences
      • Customize My Page
      • Notifications
    • Groups
    • Photos
    • Members
      • All Members
      • Advanced Search
    • Register
  • Security News
    • Financial Security
    • Thought Leadership
    • State Security
    • Healthcare Security
    • Mobile Security
    • Computer Forensics

    Latest News

    • Latest Security News
      Details

      Dual Ransomware Variants Impacting the Same Victims and Data Destruction Trends

    • Security Thought Leadership
      Details

      Amplifying Automation with AI & Strong Security Measures

    • Cyber Security News
      Details

      CommonSpirit Health cyberattack, month-long network outage cost $150M

    • Cyber Security News
      Details

      ‘Jackpot’: Hacker Snags TSA No-Fly List

    • Cyber Security
      Details

      Samsung Galaxy Store Flaws Can Lead to Unwanted App Installations, Code Execution

    • Cyber Security
      Details

      APT Hackers Turn to Malicious Excel Add-ins as Initial Intrusion Vector

    • Cyber Security
      Details

      BitKeep Confirms Cyber Attack, Loses Over $9 Million in Digital Currencies

    • Cyber Security News
      Details

      FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked

    • Cyber Security News
      Details

      Report: Air-Gapped Networks Vulnerable to DNS Attacks

Samsung Galaxy Store Flaws Can Lead to Unwanted App Installations, Code Execution

Cybersecurity firm NCC Group has shared details on two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Read more ...

APT Hackers Turn to Malicious Excel Add-ins as Initial Intrusion Vector

Microsoft's decision to block Visual Basic for Applications (VBA) macros by default for Office files downloaded from the internet has led many threat actors to improvise their attack chains in recent months.

Read more ...

BitKeep Confirms Cyber Attack, Loses Over $9 Million in Digital Currencies

Decentralized multi-chain crypto wallet BitKeep on Wednesday confirmed a cyberattack that allowed threat actors to distribute fraudulent versions of its Android app with the goal of stealing users' digital currencies.

Read more ...

HHS warning to providers: Use of pixel tracking tech without BAA violates HIPAA

The Office for Civil Rights is warning covered entities that they might be sharing protected health information with third-party tracking vendors like Facebook and Google through their use of pixel tech, in a manner that violates the Health Insurance Portability and Accountability Act.

Read more ...

Swiss seek mandatory reporting of cyberattacks on key infrastructure

ZURICH, Dec 2 (Reuters) - The Swiss government proposed on Friday making it mandatory to report cyberattacks on critical infrastructure as a way to help shed light on hackers and sound the alarm more widely.

Read more ...

DOD Releases Path to Cyber Security Through Zero Trust Architecture

Nov. 28, 2022 - The Defense Department on Tuesday released its Zero Trust Strategy and Roadmap, which spells out how it plans to move beyond traditional network security methods to achieve reduced network attack surfaces, enable risk management and effective data-sharing in partnership environments, and contain and remediate adversary activities over the next five years.

Read more ...

Cybercriminals look to exploit sports fans with World Cup-themed attacks

As the sports world’s attention turns its eyes to Qatar for the 2022 FIFA World Cup, threat actors are looking to cash-in or draw attention to their cause with attacks aimed at drawing unsuspecting fans who may be more distracted with rooting for their favored teams than cybersecurity.

Read more ...
Page 1 of 16
  • Start
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • Next
  • End
CISSP.COM CISSP.COM The Web Portal for Security Professionals

More

  • Register an Account
  • Advertise at CISSP.COM
  • Search CISSP.COM
 

Follow us

  • Facebook
  • Twitter
  • Google
 

Copyright © 2022 CISSP.COM LLC. All rights reserved. All trademarks are the property of their respective owners.

Copyright © 2025 Joomla!. All Rights Reserved. Powered by CISSP.COM - Designed by JoomlArt.com. Bootstrap is a front-end framework of Twitter, Inc. Code licensed under Apache License v2.0. Font Awesome font licensed under SIL OFL 1.1.