Singapore’s IT Security Outlook

Singapore’s IT Security Outlook

Singapore continues to be a role model when it comes to the fight towards cybersecurity readiness in Southeast Asia. The city-state has learned a lot from last year’s SingHealth data…

Read More
Cases of Cyber Attacks in Kenya Rise to 11.2 million

Cases of Cyber-Attacks in Kenya Rise to 11.2 Million

Security researchers have found that 11.2 million cyber-attacks hit organizations in Kenya in the first quarter of 2019, this is a 10.1 percent increase in the number of security incidents…

Read More
Open EDR
cyber3

Understanding Indicators of Compromise to Improve Your Cybersecurity

Indicators of compromise, or IOC, are forensic data usually found in system log entries or other files that can help identify potential malicious activities or attacks on a network. Essentially,…

Read More
The Biggest Data Breach

The Biggest and Most Affected Data Breach

There were many data breach 2016. It seemed like there was a new one in the news every other week during that year. From a cybersecurity perspective, it was one…

Read More
How SOCaaS Evolves Corporate Security Infrastructure

How SOCaaS Evolves Corporate Security Infrastructure?

Last month, June 9, 2019 we featured here in Hackercombat.com an article providing a quick glimpse of what a Security Operation Center (SOC) is all about. If we can make…

Read More
Overview Of Vulnerability Management

Overview Of Vulnerability Management

As we discuss more and more stories about vulnerabilities everyday here in Hackercombat.com, we need to empower you – our readers of the basics of vulnerability management. Programs are flawed…

Read More
NYDFS Cybersecurity Compliance for Financial Institutions

NYDFS Cybersecurity Compliance for Financial Institutions

The NYDFS Cybersecurity Regulation, also known as the 23 NYCRR 500, is a set of guidelines and regulations set forth by the New York Department of Financial Services. This created…

Read More
Threats and Security Solutions for IIoT

Threats and Security Solutions for IIoT

Industrial IoT (IIoT) provides greater connectivity to industries in all sectors, generating valuable information about operations. By using this intelligence, they can achieve significant efficiency and increase their production. In…

Read More
Second US City Pays Hackers For Ransomware

Second US City Pays Hackers For Ransomware

A city in Florida paid $ 500,000 to the hackers after a ransomware attack. The total amount the city of Florida has paid for ransomware in the past two weeks…

Read More
Vulnerability in EA Origin Game Exposed Players to Hackers

Vulnerability in EA Origin Game Exposed Players to Hackers

Electronic Arts fixes security vulnerabilities in its Origin online gaming platform after security researchers found that they could trick gamers to remotely execute malicious code on their computers The flaw…

Read More

Page 3 of 28

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register