Generative Data Intelligence

Tag: CYBER ATTACKERS

Pharmaceutical supply chains at risk of emerging cyber threats

Pharmaceutical supply chains are becoming increasingly complex as the path from production to consumption isn’t as linear as one may think.

EasyJet hack impacts nine million passengers

Airline’s systems were breached in January, but it didn’t tell the world until now. The personal details of nine million customers of...

How Public-Private Partnerships Are Working To Combat Cyber Threats

We are starting to see “tremendous collaboration” between government, the private sector to pool resources and work on finding a vaccine for COVID-19—but...

Know thy Enemy: Threat Analytics Boosts PAM Effectiveness

“Every battle is won before it is fought”― Sun Tzu, The Art of WarThe Art of War, Chinese Philosopher Sun Tzu’s treatise on...

Cybersecurity Predictions for Profitability During COVID-19 Pandemic

#KILLTHEVIRUS #SAVEHUMANITY #GROWYOURPROFITS #BEBOUNTIFULThe world-wide pandemic – COVID-19 aka ‘the novel corona virus’ affects us all globally.  It’s going to take a ‘miracle’...

Web server protection: Logs and web server security

IntroductionThis article on logs and web server security continues the Infosec Skills series on web server protection. While there are many active...

Happy Holidays from Comodo Cybersecurity

Reading Time: 3 minutesWith another year nearly behind us, this holiday season is the perfect time to start considering next year’s resolutions....

Defensive Approach to Malware | What Should Companies Do?

Reading Time: 4 minutesIt’s a mad, mad, mad, malware world. The good news is that the number of malware attacks is decreasing....

The 3 Greatest Valentine’s Day Cyber Threats

Reading Time: 3 minutesValentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers. That’s because consumers’ defenses...

3 Greatest Valentine’s Day Cyber Threats | Stay Protected Using Comodo

Reading Time: 3 minutesValentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers.That’s because consumers’...

Viro Botnet Malware Takes Many Different Forms

Reading Time: 3 minutesThe latest, strangest new ransomware appears to come from France, or at least from French speaking cyber attackers. If your Windows...

Uh Oh – UEFI rootkit malware spotted in the wild

Reading Time: 3 minutes I remember a little while back, the year was 2011. Those were the last of my consumer Windows tech support...

Latest Intelligence

spot_img
spot_img
spot_img