While there is still time left in 2019, according to the recent Data Breach QuickView Report, there were 5,183 breaches reported just in the first nine months of 2019 exposing 7.9 billion records.
The Unified Carrier Registration Plan (UCR) has reported that the tax identification numbers of registrants may have been exposed during March due to a website vulnerability that existed in its online National Registration System.
The pace of change in cybersecurity is quickening as technologies like 5G and artificial intelligence enable new services, products and modes of communication.
The credentials and user data of 3,672 Ring camera owners were compromised and exposed log-in emails, passwords, time zones and the names people give to specific Ring cameras, which are often the same as camera locations, such as “bedroom” or “front door.”
The Cybersecurity and Infrastructure Security Agency’s (CISA) Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force approved the creation of a new working group to develop attestation frameworks around various aspects of supply chain risk management best practices.
Hackers can be relentless with their cyberattacks. While organizations can be vulnerable to many security threats, ransomware is especially ruthless since its attacks are completely automated. It doesn’t matter what industry or business you are in – hackers don’t care if your organization has “nothing of value,” their machines will try to attack anything that is vulnerable.
Cloud-based solutions have grown exponentially in the past 10 years, offering secure, simple and cost-effective benefits – so why aren’t more users taking advantage of them? Simply put, people are skeptical of what they don’t fully understand, and when it comes to cloud solutions, there are many questions regarding the migration process.
This year has been a busy year for organizations and hackers alike, and terrible passwords remain unchanged. What are this year's top 25 worst passwords?