by Liquid Video Technologies | Oct 16, 2020 | Cybersecurity, Data Breaches, Network Security, Networking, Security, Security Breach
Security and Customer Relationships Security is more important than ever nowadays. The Association of Certified Fraud Examiners reported that organizations lose about five percent of their annual revenues to fraud, putting potential global fraud losses near $4...
by Liquid Video Technologies | Oct 14, 2020 | Cybersecurity, Data Breaches, Network Security, Security, Security Breach
Cybersecurity Trends The need for cybersecurity in the financial services industry has never been greater. Financial Institutions (FIs) have been and will continue to be the subject of cyberattacks by adversaries of all varieties. The old adage “why do you rob...
by Liquid Video Technologies | Oct 12, 2020 | Access Control, Cybersecurity, Data Breaches, Network Security, Security, Security Breach
In a new report into the global cybersecurity industry’s exposure on the Dark Web this year, global application security company, ImmuniWeb, uncovered that 97% of leading cybersecurity companies have data leaks or other security incidents exposed on the Dark...
by Liquid Video Technologies | Oct 9, 2020 | Access Control, Cybersecurity, Data Breaches, News, Security, Security Breach, Technology News
An adversary known for targeting the fintech sector at least since 2018 has switched up its tactics to include a new Python-based remote access Trojan (RAT) that can steal passwords, documents, browser cookies, email credentials, and other sensitive information. In an...
by Liquid Video Technologies | Oct 7, 2020 | Access Control, Cybersecurity, Data Breaches, Hacker, Network Security, Networking, Security Breach
Cybersecurity threats come in many varieties – criminals, nation states, malicious insiders, ransomware, phishing, malware…the list goes on and on. But just because there are a lot of moving parts to cybersecurity, it doesn’t mean you can’t be prepared to respond to...
by Liquid Video Technologies | Oct 5, 2020 | Access Control, Cybersecurity, Data Breaches, Network Security, Security, Security Breach, Technology News
A cybercrime group that has previously struck Docker and Kubernetes cloud environments has evolved to repurpose genuine cloud monitoring tools as a backdoor to carry out malicious attacks, according to new research. “To our knowledge, this is the first time...
Recent Comments