Here are the guides and articles we found according to your search.
303 results for "data leakage"
Cybersecurity News | QUICK READ
Indonesia: Personal Data Protection Law in Talks After Major Security Breach
Personal Information of More Than 200 Million BPJS Participants Had Allegedly Been Compromised and Leaked on an Online Forum.
Cybersecurity News | QUICK READ
Researchers Disclose Proof of Concept for New GhostRace Attack
GhostRace Impacts All Major CPU Makers and Can Lead to Data Leakage.
Cybersecurity News | QUICK READ
Daixin Threat Group Claims Ransomware Attack on 5 Hospitals in Ontario
The Data Breach Impacts at Least 267,000 patients
Access Management | INTERMEDIATE READ
Top 10 Reasons Mid-sized Businesses Need Zero Trust Security
Cybersecurity News | QUICK READ
Critical GitLab Pipeline Vulnerability Revealed. Users are urged to patch immediately
Data Leakage and Supply Chain Attacks Are Among Potential Risks.
Endpoint security | SLOW READ
[2024] 12 Best Endpoint Security Software Solutions and Tools
Features, Pros, Cons, Pricing and more.
Cybersecurity News | QUICK READ
New HiatusRAT Malware Campaign Targets U.S. Defense Department`s Server
The Unidentified Threat Group Changes Focus.
Patch management | INTERMEDIATE READ
Cybersecurity News | QUICK READ
Rhysida Ransomware: The Rise of a New Threat for Healthcare Organizations
RaaS Sparks Concerns Amidst Surge in Healthcare Attacks.
Ransomware | INTERMEDIATE READ
Locky Ransomware 101: Everything You Need to Know
How Locky Ransomware Works and How to Stay Safe from It. Detection, Decryption and Safety Tips for Locky Ransomware.
Cybersecurity News | QUICK READ
EU Healthcare: ENISA Reports that 54% of Cyber Threats Are Ransomware
The Report Identifies the Top Healthcare Cyber Threats Over the Past Two Years.
Access Management | SLOW READ
Application Control 101: Definition, Features, Benefits, and Best Practices
Application Control Works in Tandem with Privileged Access Management. Here’s Everything You Need to Know About It.
Cybersecurity News | QUICK READ
Cactus Ransomware Infiltrates Networks by Exploiting VPN Flaws
The New Ransomware Strain Encrypts Itself to Evade Antivirus and Network Monitoring Tools.
Cybersecurity News | QUICK READ
AI-Generated YouTube Videos Spread Raccoon, RedLine, and Vidar Info-stealers
Videos Lure Victims by Claiming to Offer Cracked Adobe Photoshop, Premiere Pro, and Autocad Software.
Endpoint security | INTERMEDIATE READ
Cybersecurity News | QUICK READ
WhatsApp, Teams, and Telegram – Banned in Russian Government Organizations
California-Based Zoom Video Conferencing Platform Is Not on the Blacklist.
Cybersecurity News | QUICK READ
Five Million Downloads OyeTalk Android App Leaks Private User Conversations
The App Stored Unencrypted Chats on an Unsecured Database.
Cybersecurity Basics | INTERMEDIATE READ
UEBA 101: An Introduction to User and Entity Behavior Analytics
UEBA – What Is It and How Can It Benefit Your Business?
Cybersecurity News | QUICK READ
CISA Warns of Critical Vulnerabilities on Industrial Control Systems
Keep Up with Updates for Sewio, InHand Networks, SAUTER Controls, and Siemens Devices.
Cybersecurity Basics | INTERMEDIATE READ
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats