Cybersecurity News Do You Know How Your Employees Process Personally Identifiable Information? January 6, 2022 Lale Çorumlu GDPRcyber securitycyber security newscyber security tips
Cybersecurity News Researchers Uncover Hacker Group Behind Organized Financial-Theft Operation January 5, 2022 Lale Çorumlu Elephant Beetlehackercyber securitycyber security newsSygnia
Cybersecurity News Don't Copy-Paste Commands From Webpages, You Can Get Hacked January 5, 2022 Lale Çorumlu linuxcyber securitycyber security newscyber security tips
Cybersecurity News Apple AirTags Can Be Used to Track You. How to Protect Yourself? January 4, 2022 Lale Çorumlu airtag securityApple AirTagApple AirTag securitycyber securitycyber security newscyber security tips
Cybersecurity News Are Medical Devices at Risk of Ransomware Attacks? January 4, 2022 Lale Çorumlu ransomwareransomware attackransomwarecyber securitycyber security news
Cybersecurity News Ransomware Attacks Decrease, Operators Started Rebranding January 3, 2022 Lale Çorumlu ransomware attackransomwarecyber securitycyber security news
Cybersecurity News Cyber-attack on UK’s Defence Academy Caused ‘Significant’ Damage January 3, 2022 Lale Çorumlu network securitycyber securitycyber security newscyber attack
Cybersecurity News The Top 5 Cybersecurity Tools Companies Need to Implement Right Now January 2, 2022 Lale Çorumlu Phishingcyber securitycyber security toolscyber security news
Cybersecurity News New iLOBleed Rootkit Targeting HP Enterprise Servers with Data Wiping Attacks December 31, 2021 Lale Çorumlu iLOBleediLOBleed Rootkitrootkitcyber securitycyber security news
Cybersecurity News APT ‘Aquatic Panda’ Targets Universities with Log4Shell Exploit Tools December 31, 2021 Lale Çorumlu vulnerabilitylog4jLog4Shellcyber securitycyber security news