Tag: Cover
-
Child Abusers Are Getting Better at Using Crypto to Cover Their Tracks
Crypto tracing firm Chainalysis found that sellers of child sexual abuse materials are successfully using “mixers” and “privacy …
-
Chinese APT Group Likely Using Ransomware Attacks as Cover for IP Theft
Bronze Starlight’s use of multiple ransomware families and its victim-targeting suggest there’s more to the group’s activities than …
-
Why Your Business Continuity Plan Should Cover Communication and Office Access
where your company’s digital infrastructure goes offline. Your servers are unreachable, the company website is offline, internal …
-
P2P coverage market provider Cover Protocol hacked but hacker returns stolen funds
Peer to peer coverage market provider Cover Protocol has been hacked but in a twist on a traditional hacking story, the hacker has not only …
-
Leading Global CISO Charged Over Alleged Hack Cover Up
The complaint alleges that Sullivan tried to pass the incident — in which an AWS database containing personal details of 57 million Uber …
-
CISOs: Cyber Insurance Fails to Cover Modern Threats and Remote Workforces
A large majority of CISOs are seeking additional cyber insurance coverage because of an increase in vulnerabilities resulting from the work …
-
Can DevSecOps Cover Holes Created by Digital Transformation?
The success of DevSecOps is very much dependent on the understanding that the role isn’t only technical but also procedural. They are the …
-
How to Cover Your Tracks Every Time You Go Online
Here we’re going to show you how to cover some of those tracks, or not to leave any in the first place. This isn’t quite the same as going …
-
COVID-19 Could Provide Cover for Domestic Surveillance Expansion
In the days and months to come, unprecedented global solidarity will emerge as the world battles the COVID-19 outbreak. But experts also …
-
Cover for ‘cyber’ attacks is risky, complex and people don’t trust us, moan insurers
FIC 2020 EU companies aren’t taking out insurance against attacks on online assets because the companies selling coverage aren’t organised …
-
Criminals Hide Malware Behind Grammy-Winning Cover
Songs by Ariana Grande, Taylor Swift, and Post Malone are the most popular …
-
A New Playground for Cybercrime: Why Supply Chain Security Must Cover Software Development
Most organisations see supply chains as providers of physical goods and services. The supply chain management function in these companies …
●●●