Home RSS Feed

RSS Feed

Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!

Click here to copy Url for RSS Reader
  • Are you ready? CPX 360 2022 is almost here!

    CPX 360 2022

    EXECUTIVE SUMMARY: The premiere cyber security event of the year awaits you. Registration for CPX 360 2022 is open. At the event, we’ll be talking with CISOs, business strategists, thought leaders and more. Topics will include cloud security, network security, zero trust, SASE, email security, cryptocurrency, remote work and beyond. Whatever your specific cyber security […]

    Source: CyberTalk | Published: Jan 24, 2022
  • 10 tips for protecting your identity online

    Identity fraud prevention, image

    EXECUTIVE SUMMARY: Identity theft occurs when someone leverages your personal records in order to commit fraud. Identity thieves commonly use stolen information to apply for credit cards, file taxes, get medical services, create falsified passports and more. If stolen, restoring your identity can be a nightmare of a processes. These identity theft prevention tips can […]

    Source: CyberTalk | Published: Jan 24, 2022
  • How to improve cyber security awareness company-wide

    Devin Partida, Editor-in-Chief, Rehack.com

    Devin Partida writes about cyber security and technology. She is also the Editor-in-Chief of ReHack.com.  Cyber security awareness is the key to protecting your company from today’s rising security threats. Tackling cyber security awareness at the company-wide level might seem like a daunting task. However, there are some easy steps you can take to get started. […]

    Source: CyberTalk | Published: Jan 21, 2022
  • 10 data privacy ‘manager-approved’ best practices

    Data on a circuit-board concept art

    EXECUTIVE SUMMARY: Businesses collect a mind-bogglingly large amount of data everyday and implementing a comprehensive data privacy program isn’t easy. It can require changing mindsets, securing budgets, changing vendors, maintaining process inventories, holding training events, adopting a privacy governance model, new levels of accountability and more. Are you exhausted by just reading the previous sentence? […]

    Source: CyberTalk | Published: Jan 21, 2022
  • 6 top firewall threats and vulnerabilities

    Cyber security concept art, firewalls and firewall threats abstract

    FIREWALL THREATS: Proactively addressing security by implementing firewalls keeps your enterprise competitive and safe. Firewalls often function as the first line of defense in protecting network systems from threats. They provide control over entry points, monitor attempts to gain system access, block unwanted traffic, and prevent external threats from landing in your environment. One these […]

    Source: CyberTalk | Published: Jan 20, 2022
  • Check Point Quantum Lightspeed: World’s fastest firewall for securing datacenters

    Russ Schafer, Head of Product Marketing, Security Platforms

    By Russ Schafer, Head of Product Marketing, Security Platforms, Check Point Software Modern businesses now require network security that performs at extremely high speeds and that offers the ability to execute massive daily backups and transfers of multi-terabyte files. Organizations also need ultra-low latency to support sensitive applications like high frequency trading platforms and other […]

    Source: CyberTalk | Published: Jan 19, 2022
  • Data wiping cyber attacks could be next, CISA warns

    Network and server room concept

    EXECUTIVE SUMMARY: The Cybersecurity and Infrastructure Security Agency (CISA) warns US organizations to strengthen their cyber security posture in relation to potential data wiping attacks, which have recently been observed targeting Ukrainian government agencies and businesses. Late last week, Ukrainian government agencies and corporate groups contended with coordinated cyber attacks involving website defacement and data-wiping […]

    Source: CyberTalk | Published: Jan 19, 2022
  • Major US airlines warn of service disruptions ahead of 5G rollout

    Person stuck in airport, 5G rollout gone-wrong

    EXECUTIVE SUMMARY: In the US, the chief executives of major airlines warned of an impending “catastrophic” aviation crisis in fewer than 36 hours, once key telecommunications companies deploy a new 5G service. Basic Information The airlines asserted that a nation-wide 5G launch on the part of telecommunications companies would interrupt airline operations, rendering a significant […]

    Source: CyberTalk | Published: Jan 18, 2022
  • Russian security takes down REvil gang and discovers…

    Cyber security concept, ransomware, abstract 2022

    EXECUTIVE SUMMARY: The REvil ransomware operators once dominated the ransomware scene. During the second quarter of 2021, experts linked 73% of all ransomware attacks back to the REvil gang. Across 12 months, their brazen campaigns hit more than 300 US-based organizations, and captured more than $11 million in profit. Per requests from the US, Russia’s […]

    Source: CyberTalk | Published: Jan 18, 2022
  • What is clone phishing and why it matters

    Clone phishing email concept with envelope in lavender color

    EXECUTIVE SUMMARY: The next level of nefarious? Clone phishing campaigns. In this article, discover how to define, recognize and prevent clone phishing attacks.  Definition: What is clone phishing? A clone phishing attack leverages an existing or previously distributed email containing attachments or links. In the clone version, these elements are replaced with malicious doppelgangers containing […]

    Source: CyberTalk | Published: Jan 14, 2022
  • Most email scanner ‘allow lists’ can’t catch this O365 & Gmail attack

    Malicious email, security concept that's abstract

    EXECUTIVE SUMMARY: Cyber adversaries are creating accounts within the Adobe Creative Cloud suite and delivering malicious payloads to Office 365 and Gmail users. Ninety-percent of cyber attacks start with a malicious email. Does your organization have adequate email security? What’s happening These hackers’ malicious phishing emails appear as though they come from legitimate cloud users. […]

    Source: CyberTalk | Published: Jan 14, 2022
  • Log4j in 2022: Expert insights, adversaries and actions

    Cybersecurity,Vulnerability,Log4j,,Security,Flaw,Based,On,Open-source,Logging,Library,

    EXECUTIVE SUMMARY: Data from 2021 highlights a significant increase in corporate network-focused cyber attacks as compared with figures from 2020. Cyber security researchers attribute some of the increases, which were concentrated towards the end of the year, to the Log4j vulnerability, which surfaced in December.  Since then, the world has watched as a series of […]

    Source: CyberTalk | Published: Jan 13, 2022