"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
On Monday, November 7 of 2022, Lockbit hackers were supposed to publish "highly sensitive and confidential information" of Thales, a...
Read moreDuring regular threat hunting activities, Kaspersky identified malicious Tor Browser installers. According to their telemetry, all the victims targeted...
Read moreOn July 13th, 2022, Emotet suddenly stopped spamming in what appears to be a move to protect its victims. It...
Read moreCryptojacking is a form of cybercrime in which cybercriminals exploit any kind of connected devives (computers, smartphones, tablets, IOT or...
Read moreThe person responsible for protecting Uber's data was found guilty of inadequately safeguarding the information, which makes CISOs' personal liability...
Read moreSocial engineering is a tricky, and fascinating, field of study. It involves the research, analysis, and execution of methods to...
Read moreAbstract The commercial maritime industry moves around the world 90% of all goods. Ships are...
Read moreCybersecurity is perceived as a complex topics by most of the people and a lot of false information and believes...
Read moreAbstract External website resources can de references toward existing, expired or incorrect domain names. We...
Read moreMajor Cyber Insurance now exclude Cyber Operation and Cyber War from...
Read more"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
XRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.