All Cyber Threat Intelligence (CTI) articles – Page 5
-
NewsCourt stops RNZ using more hacked material
Public broadcaster Radio New Zealand (RNZ) has been ordered by the country’s high court not to use any more information stolen in a cyber-attack on Waikato District Health Board (DHB) last May.
-
NewsWeak US government cyber security ‘puts individuals’ data at risk’
The personal information of millions of Americans is at risk because branches of government have failed to implement basic defences against cyber-attacks, according to a Senate committee report.
-
NewsHacked Saudi Aramco data ‘for sale’
Threat actors are reportedly offering 1 TB of proprietary data stolen from the Saudi Arabian Oil Company on the darknet for a negotiable price of $5m (€4.25m).
-
ebookHas O365 closed the door to data leaks?
Efficiency, collaboration and security are often the positive messages in regards to implementing Office365 in any organisation. But, is your organisation truly experiencing the comfort of safe communication?
-
NewsUS and allies accuse China of global hacking spree
The United States and its allies have publicly accused China of a worldwide cyber espionage campaign, with US secretary of state Antony Blinken saying the activity posed “a major threat to our economic and national security”.
-
NewsCovid-19 test centre referred to police for poor privacy security
Denmark’s DPA Datatilsynet has reported Medicals Nordic to the police for processing users’ health and other confidential information about their coronavirus tests with inadequate security.
-
WebinarPrivate Healthcare: Why do you need intelligent email security?
Email is a vital communication tool for organisations globally. But email is the top security risk for healthcare providers as employees accidentally leak data everyday.
-
ebookOneTrust GRC: Steering Your IT Risk Management Program
Cybersecurity in line with IT risk management is important for both your internal and external GRC execution. Forrester, a world-wide research and advisory firm, recently surveyed CEO’s to produce a new report, The Biggest Trends Shaping Enterprise Risk Management.
-
NewsHackers extract client details from South African insurance services company
Qsure has created an alternative IT network after cyber-attackers gained unauthorised access to and exfiltrated data from its systems.
-
NewsEC setting up unit to tackle rising cyber-attacks
The European Commission plans to create a specialised organisation to counter tackle the increasing number of cyber incidents impacting public services, businesses and citizens across the EU.
-
VideoInternal Threats: Top Threats to your IT Security and how to Address Them
From employees accidentally clicking on malicious links, to sabotage, theft of data and unauthorised access, companies have plenty of potential insider cyber security threats to consider.
-
NewsNYC Law Department struck by cyber attack
The Federal Bureau of Investigation (FBI) have launched an investigation into a cyberattack targeting the IT system belonging to the New York City Law Department.
-
BlogThe key theme: third party risk management
Rapid shifts in the way we structure our IT infrastructrues have put a spotlight on third party risk management, which is a key theme of PrivSec Global next month. Emma Osborn explains why the issue is so important for privacy and security.
-
SponsoredMicrosoft: Identifying and managing insider threats
Data breaches due to the behaviour of insiders is of increasing concern globally, but how do you tackle the problem? Neha Monga of Microsoft explains how you can identify and mitigate the risks
-
VideoThe UK Cyber Security Council: Perspectives on the role of the CISO
The UK Cyber Security Council: Perspectives on the role of the CISO The newly formed UK Cyber Security Council will discuss the changing role of the CISO, whether it is important or essential for qualifications and certifications for the role.
-
ebookThe Bigger Picture - Privacy and Work in the New Normal
Prior to the coronavirus outbreak, home working whilst not unheard of, was still relatively uncommon, or in many cases limited to a few days per month.
-
WebinarAgile Crypto and the Quantum Threat
As the reality of quantum computing approaches, companies and other organizations need to stay one step ahead of the potential computational power that could render today’s encryption algorithms obsolete.
-
NewsHackers access live feeds ‘from 150,000 surveillance cameras’
A group of hackers says it has breached security systems and viewed live feeds from 150,000 surveillance cameras supplied by Verkada to general and psychiatric hospitals, women’s health clinics, police stations, prisons, schools and companies, including car maker Tesla and software provider Cloudflare.
-
BlogWhat makes us human: countering the accidental insider cyber threat
Everybody makes mistakes in the workplace and sometimes this can lead to sensitive information being put at risk. Philip Bridge discusses how to mitigate against these risks.
-
NewsOxfam Australia probes potential hack
The Australian arm of charity Oxfam is investigating a potential data breach.


