• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Latest Cybersecurity News  / Software reviews  / What is
Top 5 Best Email Security Management Tools For 2022
William Marshal Posted On April 29, 2022

email security tools

Here are the top 5 best email security tools for your business. Ensure you don’t fall victim to phishing threats by enhancing your email security and cyber hygiene.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Latest Cybersecurity News
Elon Musk wants Twitter DM’s to be end-to-end encrypted like Signal
William Marshal Posted On April 28, 2022

Elon Musk Twitter

Elon Musk made a tweet on Thursday that Twitter DM’s will be equipped with end-to-end encryption just like the Signal messaging app, thus possibly bringing better privacy and security over user communications.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Intruders  / Latest Cybersecurity News
FBI warns of BlackCat ransomware that has breached 60 entities worldwide
William Marshal Posted On April 25, 2022

BlackCat ransomware

The FBI has sent a high alert on the BlackCat ransomware-as-a-Service, as the variant have affected at least 60 entities across the world from November 2021 to March 2022.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Latest Cybersecurity News
EU officials are targeted using Pegasus Software
William Marshal Posted On April 12, 2022

Pegasus software hack

Senior EU officials were targeted via NSO Group’s famous spying software Pegasus as per the latest report from Reuters.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Intruders  / Latest Cybersecurity News  / Linux security  / Mac security  / Windows security
New Mars Stealer malware is distributed via Google Ads and OpenOffice
William Marshal Posted On March 30, 2022

Mars Stealer malware

A new information stealing payload called Mars Stealer malware is increasing in popularity and threat analysts have spotted large scale campaigns are employing it


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Latest Cybersecurity News
Seven teenagers of LAPSUS$ hackers group arrested by UK Police
William Marshal Posted On March 26, 2022

LAPSUS$ hackers

London City Police arrested seven teenagers between the ages of 16 and 21 for their connections with the prolific LAPSUS$ hackers gang which was behind the breach of NVIDIA, Ubisoft, Samsung, LG, Okta and Microsoft.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / Device security  / Intruders  / Latest Cybersecurity News  / Mobile security
Telegram banned by Brazil for being unresponsive on emails
William Marshal Posted On March 19, 2022

Telegram banned

The Supreme Federal Court Justice Alexandre de Moraes of Brazil has banned Telegram on Friday and asked the National Telecommunications Agency to intimate internet providers to block the messaging service in next five days.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / Device security  / Latest Cybersecurity News  / Linux security  / Mac security  / What is  / Windows security
Create the best vulnerability management strategy for your network
William Marshal Posted On March 18, 2022

best vulnerability management strategy

The Vulnerability management strategy is composed of six stages, that comes with several challenges needing to be addressed individually. In this article, we will see how organizations and IT teams can build an effective cybersecurity posture for this year. This article will discuss how organizations and IT teams can build an effective cybersecurity posture for this year.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Intruders  / Latest Cybersecurity News  / What is
Chinese APT41 hackers breached into Six U.S. State Organizations
William Marshal Posted On March 9, 2022

Chinese APT41 hackers

The Chinese APT41 hackers, a state-sponsored threat entity of China had breached into at least six U.S state government environment from May 2021 to Feb 2022.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Intruders  / Latest Cybersecurity News
COVID passport apps puts users privacy and their personal data at risk
William Marshal Posted On March 8, 2022

COVID passport apps

The Digital Vaccination Applications that are commonly used as safe passes and travel passports are exhibiting behavior that could put users’ privacy at risk. The risks are substantial as these COVID passport apps are used by large population across the world, and are becoming a target beacon for hackers.


Continue Reading
0




11
Newer Posts Older Posts

  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search