Infosecurity News

Data Breach at Texas Benefits Recovery Firm

Data Breach at Texas Benefits Recovery Firm

Benefit recovery specialists hacked and PHI of over a quarter of a million people exposed

Jewish Service Zoom-bombed with Swastikas

Jewish Service Zoom-bombed with Swastikas

Connecticut synagogue’s virtual service disrupted by anti-Semitic symbols

Superdrug Makes Anti-Cyberbullying Pledge

Superdrug Makes Anti-Cyberbullying Pledge

UK retailer urges social media users to #BeKind

Cofense Detects HMRC #COVID19 Tax Relief Scam

Cofense Detects HMRC #COVID19 Tax Relief Scam

Phishing email targets those whose ability to work has been impacted by the pandemic

Media and Video Companies Suffer Huge Increase in Cyber-Attacks

Media and Video Companies Suffer Huge Increase in Cyber-Attacks

The media industry faced 17 billion credential stuffing attacks during 2018 and 2019

CISA: Patch Critical SAP RECON Bug Now

CISA: Patch Critical SAP RECON Bug Now

Vulnerability affects SAP NetWeaver Application Server (AS) Java component

More Malware Found Hidden in Chinese Tax Software

More Malware Found Hidden in Chinese Tax Software

Firms doing business in China urged to be on high alert

Experts: Patch Wormable DNS Server Bug Immediately

Experts: Patch Wormable DNS Server Bug Immediately

Microsoft Patch Tuesday fixes 123 CVEs this month

US the Primary Target of “Significant” Cyber-Attacks

US the Primary Target of “Significant” Cyber-Attacks

The US has faced 156 major cyber-attacks over the past 15 years

‘Secure’ Chat App Spies on Users

‘Secure’ Chat App Spies on Users

Welcome Chat leaks stolen data and is embroiled in cyber-espionage

Herjavec Group Acquires Securience

Herjavec Group Acquires Securience

British identity management firm acquired by Shark Tank investor’s cybersecurity company

Park Place Technologies Appoints Security and Army Veteran as its First CISO

Park Place Technologies Appoints Security and Army Veteran as its First CISO

John Parlee joins the company to align business and security objectives

What’s Hot on Infosecurity Magazine?