June 2021

Space operations are vital to advancing the security, economic prosperity, and scientific knowledge of the Nation. However, cyber-related threats to space assets and supporting infrastructure pose increasing risks to the economic promise of emerging ma…

Read More Introduction to Cybersecurity for Commercial Satellite Operations: Draft NISTIR 8270 Available for Comment

Analysis: UK prides itself on GCHQ’s cyber capability – so availability of Raab’s number will have been embarrassing for himDominic Raab’s mobile number freely available online for last decadeFinding Dominic Raab’s mobile phone online is more than just…

Read More For UK foreign secretary, simply having a mobile represents a security risk – analysis

Businesses deal with different software documents every day. They contain sensitive information that involves various business transactions, processes, and systems. Hence, it’s crucial to ensure data security when managing software documentation. What Is Software Documentation? Software documentation refers to written text or graphic illustration embedded in the computer software or source code. The two categories […]

The post 5 Ways To Ensure Data Security In Software Documentation appeared first on CyberDB.

Read More 5 Ways To Ensure Data Security In Software Documentation

Controversial antivirus software pioneer who entered US politics and became a fugitive from justiceAs the inventor of the antivirus software that bears his name, John McAfee, who has died aged 75 after apparently taking his own life in a Spanish priso…

Read More John McAfee obituary

The cross-site scripting (XSS) susceptibility plus various supply chain operations greatly impact on the Linux marketplaces, which are located on the Pling platform. This is the outcome of a study…

The post Researcher Discovers Susceptibility Affecting Numerous Linux Marketplaces appeared first on Hacker Combat.

Read More Researcher Discovers Susceptibility Affecting Numerous Linux Marketplaces

DDoS attacks and other forms of botnet attacks remain some of the biggest cybersecurity challenges that are often the most difficult to defend against. In 2020 and early 2021, the number of DDoS attacks is continuously increasing, and the number of active malicious botnets is also rapidly increasing to a very alarming number.  With that […]

The post Guide To Effective Botnet Prevention Methods: 2021 Update appeared first on CyberDB.

Read More Guide To Effective Botnet Prevention Methods: 2021 Update

By 2035, artificial intelligence could double economic growth in Canada and economic growth rates globally. It’s not, however, just legitimate businesses that will take advantage of AI-based tools. Cybercriminals will also exploit the technology to improve their income.  While there are several ways to do this, deepfakes may pose one of the greatest threats. This […]

The post Deepfakes and Their Possible Impact on Business Data Security appeared first on CyberDB.

Read More Deepfakes and Their Possible Impact on Business Data Security

Cloud computing is a simple way for companies to upscale their operations without incurring huge infrastructural costs. Firms currently use an average of 8 clouds and expect this to increase to around 11 by the end of 2023. The cloud industry is enjoying unprecedented growth and will hit a new high in 2022. Forecasts suggest […]

The post The Importance of Using the Right Cloud Service Provider appeared first on CyberDB.

Read More The Importance of Using the Right Cloud Service Provider

The White House Office of Science and Technology Policy and the National Science Foundation announced the formation of the National Artificial Intelligence (AI) Research Resource Task Force June 10, 2021. The task force will advance the objectives stat…

Read More ITL Chief of Staff Elham Tabassi to serve on newly formed National AI Research Resource Task Force

Honeywell is a massive organization in the American industrial market, and an industrial cybersecurity world leader. The organization has introduced an advanced cybersecurity monitoring and occurrence response service. This service…

The post Honeywell Introduces Operational Technology Cybersecurity Service to Facilitate Monitoring and Response, and Boost Safety appeared first on Hacker Combat.

Read More Honeywell Introduces Operational Technology Cybersecurity Service to Facilitate Monitoring and Response, and Boost Safety

Hackers and their tactics are always developing. With the evolving cybersecurity environment, hackers have been pushed to devise different cyber strike techniques. As a result, cybersecurity issues are now more common and sophisticated than they were years ago.  Security On The Digital Battlefield  When hackers utilize advanced tools to cause chaos on your app, you […]

The post Penetration Testing 101: How To Make Sure Your App Is Secure appeared first on CyberDB.

Read More Penetration Testing 101: How To Make Sure Your App Is Secure

Not all security vulnerabilities can be found through automated processes or testing. Internal and external reporting of security vulnerabilities in software and information systems owned or utilized by the Federal Government is critical to mitigating …

Read More Recommendations for Federal Vulnerability Disclosure Guidelines: Draft NIST SP 800-216 Available for Comment

In a previous article, we discussed whether the printer you have connected to your computer can be a security risk to your data. A printer, especially a wireless one, is a terminal that can still be utilized by attackers to gain access to your data. We also discussed how to best secure your printer and […]

The post Could Your Power Supply Be a Security Risk to Your Data? Here’s What You Should Know appeared first on CyberDB.

Read More Could Your Power Supply Be a Security Risk to Your Data? Here’s What You Should Know

Industrial switches are made using universal firmware developed by Korenix Technology, a leading provider for industrial networking solutions based in Taiwan. As a result, nearly all industrial switches in the…

The post Industrial Switches from different Vendors Impaired by Similar Exposures appeared first on Hacker Combat.

Read More Industrial Switches from different Vendors Impaired by Similar Exposures

NIST’s National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NIST Interagency or Internal Report (NISTIR) 8334, Using Mobile Device Biometrics for Authenticating First Responders. Many public safety organizations (PSOs) a…

Read More Using Mobile Device Biometrics for Authenticating First Responders: Draft NISTIR 8334 Available for Comment

In the last decade, cybercrime has become more sophisticated. Most individuals are not very keen on cybercrime and assume only corporates and businesses are targets. Ransomware is a prevalent form…

The post A Comprehensive Answer to the Frequently Asked Question “What is WannaCry Ransomware?’ appeared first on Hacker Combat.

Read More A Comprehensive Answer to the Frequently Asked Question “What is WannaCry Ransomware?’

Data security has always been a priority number one for business entities, and this question is topical in modern realities. The COVID-19 pandemic forced employees to turn to remote work, making inroads for cyber attacks. That’s why measures on data protection are necessary for every organization. Today, we do not imagine our lives without online […]

The post Tips for Protecting Business Data appeared first on CyberDB.

Read More Tips for Protecting Business Data