Singapore continues to be a role model when it comes to the fight towards cybersecurity readiness in Southeast Asia. The city-state has learned a lot from last year’s SingHealth data…
Read More
Singapore continues to be a role model when it comes to the fight towards cybersecurity readiness in Southeast Asia. The city-state has learned a lot from last year’s SingHealth data…
Read More
Security researchers have found that 11.2 million cyber-attacks hit organizations in Kenya in the first quarter of 2019, this is a 10.1 percent increase in the number of security incidents…
Read More

Indicators of compromise, or IOC, are forensic data usually found in system log entries or other files that can help identify potential malicious activities or attacks on a network. Essentially,…
Read More
There were many data breach 2016. It seemed like there was a new one in the news every other week during that year. From a cybersecurity perspective, it was one…
Read More
Last month, June 9, 2019 we featured here in Hackercombat.com an article providing a quick glimpse of what a Security Operation Center (SOC) is all about. If we can make…
Read More
As we discuss more and more stories about vulnerabilities everyday here in Hackercombat.com, we need to empower you – our readers of the basics of vulnerability management. Programs are flawed…
Read More
The NYDFS Cybersecurity Regulation, also known as the 23 NYCRR 500, is a set of guidelines and regulations set forth by the New York Department of Financial Services. This created…
Read More
Industrial IoT (IIoT) provides greater connectivity to industries in all sectors, generating valuable information about operations. By using this intelligence, they can achieve significant efficiency and increase their production. In…
Read More
A city in Florida paid $ 500,000 to the hackers after a ransomware attack. The total amount the city of Florida has paid for ransomware in the past two weeks…
Read More
Electronic Arts fixes security vulnerabilities in its Origin online gaming platform after security researchers found that they could trick gamers to remotely execute malicious code on their computers The flaw…
Read More