Top news of the week: 07.12.2021.
Threats And Attacks
Hackers Increasingly Using RTF Template Injection Technique in Phishing Attacks
Hackers have been increasingly using RTF Template Injection method in widespread phishing attacks.
Week in review: 150+ HP multifunction printers under attack, how to combat ransomware with visibility
Here's an overview of some of last week's most interesting news, articles and interviews: Determined APT is exploiting ManageEngine ServiceDesk Plus
Innovations And Trends
The Matrix Is the Best Hacker Movie
Most people point to 'Sneakers' or 'WarGames'. They’re all wrong. The Wachowskis actually invented the ultimate cyber superhero.
What U.S. Companies Should Expect from China’s New Data Privacy Laws
China had a lot of legislative movement in the area of data privacy this year. On June 10, 2021, the Data Security Law (DSL) was passed and it became...
Data Privacy
The Cost of a Ransomware Attack, Part 2: Response & Recovery
The costs of downtime, response, recovery, reputational damage, and more may make a little ransom payout to cyberattackers look like pocket change. Part 2 of 2.
Data Protection Officer (DPO) Certification 2022
Training and examination The training covers an in depth insight of the GDPR and all implementation obligations; a …
Startups And Investments
Capgemini sets its ESG objectives to reinforce the impact of its sustainable development strategy
Capgemini has unveiled 8 priorities and 11 ambitious objectives that are gathered into a new Environment, Social and Governance policy (ESG).
Colorado energy company loses 25 years of data after cyberattack, still rebuilding network
DMEA did not use the term "ransomware" but said much of their data had been corrupted while phone and email services were down for weeks.
Companies And Services
Suspected Chinese hackers breach more US defense and tech firms
A suspected Chinese hacking campaign has breached four more US defense and technology companies in the last month, and hundreds more US organizations are running the type of vulnerable ...
Cloud Shared Responsibility: Who’s accountable for cloud security?
Earn up to 6.5 CPE credits by attending this virtual conference. In a cloud environment, you can’t simply hand the keys to a cloud service provider and walk ...
Business And Industries
The Cyber Threats Facing Retailers This Holiday Shopping Season
With supply chain delays and an online shopping boom, attacks will come from multiple angles.
It's Time For Businesses To Demand That Software Vendors Provide An SBoM
A company can have better risk control once it knows what is "in" the software it uses.