Common Social Engineering Attacks and How to Prevent Them

Common Social Engineering Attacks and How to Prevent Them

Organizations from all over the world are experiencing an increase in social engineering attacks, both in number and in sophistication. Hackers are devising more clever methods of fooling individuals or…

Read More
API Security Developers And Users Responsibility

API Security, Developers And Users Responsibility

The world of software development today is flooded by APIs (Application Programming Interface). We can think of whatever web service provider today, and surely that vendor offers APIs for their…

Read More
Open EDR
5 Informative Security Podcasts to Listen To

5 Informative Security Podcasts to Listen To

Cyber security is a complex area of security. With technology evolving faster and faster every year, new methods of cyber attacks are being invented, and new cyber security methods are…

Read More
An Overview Malwarebytes 2019 State of Malware Report

An Overview: Malwarebytes’ 2019 State-of-Malware Report

There are times in order to somehow forecast the future of cybersecurity, data from the past is required. However, there is still a tendency for cybercriminals to actually innovate beyond…

Read More
Review of Cybersecurity Measures For Customers and Vendors

Review of Cybersecurity Measures For Customers and Vendors

Cybersecurity measures can only be tested in two ways, the first one is something nobody wants to happen: to be tested for real, by a real cyber attack. The second…

Read More
Microfocus Endace  Strong Network Analytics System To Be Developed

Microfocus, Endace: Strong Network Analytics System To Be Developed

Two tech giants are partnering very soon to deliver a one-of-a-kind business-focused solution, as Micro Focus (software and business analytics) and Endace (network recording analysis) announced their collaboration. The disclosure…

Read More
Cybersecurity Protection Needs To Reach The Next Level

Cybersecurity Protection Needs To Reach The Next Level

Here in Hackercombat.com, we recently reported about IBM’s security study about financial cost due to breaches are getting expensive. A similar study, this time by Accenture with partnership with Ponemon…

Read More
Australia’s TGA Medical Devices Cybersecurity Guidelines

Overview Of Australia’s TGA Medical Devices Cybersecurity Guidelines

Technology came a long way, to a point that medical equipment can now get hacked. Hackercombat.com has for years featured stories about hacked medical equipment, all things considered, it is…

Read More
Fundamental Actions Regarding Ransomware

Fundamental Actions Regarding Ransomware

Ransomware is a category of malware that brings trouble to users by locking files by an industry-standard encryption protocol (usually AES – Advanced Encryption Standard), and asking them to pay…

Read More
Cybersecurity In Mid 2019 Nothing To See Here Same Problems

Cybersecurity In Mid-2019: Nothing To See Here, Same Problems

The need for cybersecurity measures has been viewed as an issue, however, many companies have problems with countermeasures, as proven by our many years of coverage of cybersecurity news here…

Read More

Page 2 of 28

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register