Singapore continues to be a role model when it comes to the fight towards cybersecurity readiness in Southeast Asia. The city-state has learned a lot from last year’s SingHealth data…
Read MoreSingapore continues to be a role model when it comes to the fight towards cybersecurity readiness in Southeast Asia. The city-state has learned a lot from last year’s SingHealth data…
Read MoreSecurity researchers have found that 11.2 million cyber-attacks hit organizations in Kenya in the first quarter of 2019, this is a 10.1 percent increase in the number of security incidents…
Read MoreIndicators of compromise, or IOC, are forensic data usually found in system log entries or other files that can help identify potential malicious activities or attacks on a network. Essentially,…
Read MoreThere were many data breach 2016. It seemed like there was a new one in the news every other week during that year. From a cybersecurity perspective, it was one…
Read MoreLast month, June 9, 2019 we featured here in Hackercombat.com an article providing a quick glimpse of what a Security Operation Center (SOC) is all about. If we can make…
Read MoreAs we discuss more and more stories about vulnerabilities everyday here in Hackercombat.com, we need to empower you – our readers of the basics of vulnerability management. Programs are flawed…
Read MoreThe NYDFS Cybersecurity Regulation, also known as the 23 NYCRR 500, is a set of guidelines and regulations set forth by the New York Department of Financial Services. This created…
Read MoreIndustrial IoT (IIoT) provides greater connectivity to industries in all sectors, generating valuable information about operations. By using this intelligence, they can achieve significant efficiency and increase their production. In…
Read MoreA city in Florida paid $ 500,000 to the hackers after a ransomware attack. The total amount the city of Florida has paid for ransomware in the past two weeks…
Read MoreElectronic Arts fixes security vulnerabilities in its Origin online gaming platform after security researchers found that they could trick gamers to remotely execute malicious code on their computers The flaw…
Read More