Organizations from all over the world are experiencing an increase in social engineering attacks, both in number and in sophistication. Hackers are devising more clever methods of fooling individuals or…
Read MoreThe world of software development today is flooded by APIs (Application Programming Interface). We can think of whatever web service provider today, and surely that vendor offers APIs for their…
Read MoreCyber security is a complex area of security. With technology evolving faster and faster every year, new methods of cyber attacks are being invented, and new cyber security methods are…
Read MoreThere are times in order to somehow forecast the future of cybersecurity, data from the past is required. However, there is still a tendency for cybercriminals to actually innovate beyond…
Read MoreCybersecurity measures can only be tested in two ways, the first one is something nobody wants to happen: to be tested for real, by a real cyber attack. The second…
Read MoreTwo tech giants are partnering very soon to deliver a one-of-a-kind business-focused solution, as Micro Focus (software and business analytics) and Endace (network recording analysis) announced their collaboration. The disclosure…
Read MoreHere in Hackercombat.com, we recently reported about IBM’s security study about financial cost due to breaches are getting expensive. A similar study, this time by Accenture with partnership with Ponemon…
Read MoreTechnology came a long way, to a point that medical equipment can now get hacked. Hackercombat.com has for years featured stories about hacked medical equipment, all things considered, it is…
Read MoreRansomware is a category of malware that brings trouble to users by locking files by an industry-standard encryption protocol (usually AES – Advanced Encryption Standard), and asking them to pay…
Read MoreThe need for cybersecurity measures has been viewed as an issue, however, many companies have problems with countermeasures, as proven by our many years of coverage of cybersecurity news here…
Read More