In the span of only four months, four large Android malware families were spread via Google Play, resulting in 300.000+ infections via multiple dropper apps, according to ThreatFabric research.
As part of the Enduring Security Framework, the National Security Agency and the Cybersecurity and Infrastructure Security Agency published guidance to mitigate cyber threats within 5G cloud infrastructure.
Although cybercriminals will always try to adapt to new security measures and insert themselves in the middle of a financial transaction, financial firms can prevent cyberattacks by using fingerprint, facial recognition, and other verification methods that cannot be stolen or faked.
Navisite's "The State of Cybersecurity Leadership and Readiness" report found that 45% of companies do not employ a Chief Information Security Officer (CISO).
Security talks to Chris Hass, former Department of Defense cybersecurity analyst, about why companies shouldn't rely on cyber insurance and what can be done to prepare instead.
The new realities of communicating in the remote work environment have led to a whole new set of challenges. Initiatives related to protecting users on virtual meeting tools should be at the forefront of every government’s cybersecurity agenda.