#1 Trusted Cybersecurity News Platform
Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
AI Security

Password Protection | Breaking Cybersecurity News | The Hacker News

Why Holidays Put Your Company at Risk of Cyber Attack (And How to Take Precautions)

Why Holidays Put Your Company at Risk of Cyber Attack (And How to Take Precautions)

Dec 09, 2021
It is a time when many are thinking of their families and loved ones, time off work, and gift-giving – the holidays. However, while many have their minds outside the realm of work during the holiday season, often, this is when attackers plan their most sinister attacks.  So how can you take precautions to protect your organization during these times? Why holidays put your company at risk of cyberattack Attackers today do not have a soft spot for businesses and give companies a break at any time of the year, especially not during holidays. On the contrary, any time of the year where companies may be less prepared to fend off a cyberattack is an opportunity for successful compromise. As a result, the holidays put your company at a higher risk of cyberattack.  Most end-users do not think about cybersecurity when surfing the web or receiving emails with holiday deals during the season. As a result, many let their guard down to a certain degree and become preoccupied and distracted m
 Australian Police Arrest Man for Hacking Nearly 100 Online Accounts

Australian Police Arrest Man for Hacking Nearly 100 Online Accounts

Dec 16, 2010
The Australian police have arrested a 33-year-old man accused of hacking into nearly 100 online accounts. The Australian Federal Police's high-tech crime unit has been monitoring the suspect since last September. This surveillance began when a local telecom company alerted the authorities to suspicious activity within its network. The man allegedly hacked into private and business Internet accounts, downloading data and engaging in other fraudulent activities. The suspect was arrested yesterday, and police confiscated his computer equipment. He now faces charges related to computer intrusion, including unauthorized access, modification, or impairment with intent to commit a serious offense. Neil Gaughan, the national manager of high-tech crime operations and assistant commissioner, stated that this arrest serves as a reminder for people to protect their online safety. "Anyone can be targeted by criminals online; it's important to be aware of the risks and take appropriate act
How to Increase Engagement with Your Cybersecurity Clients Through vCISO Reporting

How to Increase Engagement with Your Cybersecurity Clients Through vCISO Reporting

Jul 22, 2024vCISO / Business Security
As a vCISO, you are responsible for your client's cybersecurity strategy and risk governance. This incorporates multiple disciplines, from research to execution to reporting. Recently, we published a comprehensive playbook for vCISOs, "Your First 100 Days as a vCISO – 5 Steps to Success" , which covers all the phases entailed in launching a successful vCISO engagement, along with recommended actions to take, and step-by-step examples.  Following the success of the playbook and the requests that have come in from the MSP/MSSP community, we decided to drill down into specific parts of vCISO reporting and provide more color and examples. In this article, we focus on how to create compelling narratives within a report, which has a significant impact on the overall MSP/MSSP value proposition.  This article brings the highlights of a recent guided workshop we held, covering what makes a successful report and how it can be used to enhance engagement with your cyber security clients.
Hacker Poses as Graduate, Hacks Student Emails, Faces Legal Consequences

Hacker Poses as Graduate, Hacks Student Emails, Faces Legal Consequences

Dec 01, 2010
A hacker who posed as a university graduate to access the emails of hundreds of students has been given a suspended prison sentence and ordered to pay more than £20,000 in costs and compensation. Daniel Woo, a 23-year-old Bulgarian national, was sentenced for offenses under the Misuse of Computers Act on November 25. Woo was arrested in November 2006 at the University of London's School of Oriental and African Studies after IT staff noticed anomalies in the computer network's operation. He used various hacking techniques to break into students' accounts by obtaining their passwords. Woo then installed software called 'Cain and Able' on several machines, which allowed him to collect additional student passwords and monitor traffic on the university's computer network. It was later confirmed that fraud had occurred on several compromised payment accounts. Additionally, Woo has been banned from entering any university, college, or place of higher education witho
cyber security

Free OAuth Investigation Checklist - How to Uncover Risky or Malicious Grants

websiteNudge SecuritySaaS Security / Supply Chain
OAuth grants provide yet another way for attackers to compromise identities. Download our free checklist to learn what to look for and where when reviewing OAuth grants for potential risks.
Cybersecurity
Expert Insights
Cybersecurity Resources