Let’s face it: your inbox is a warzone. Email security is a constant battle between evolving threats and the defenses designed to stop them. Every day, attackers bombard user inboxes with increasingly sophisticated phishing attempts, malware, and social engineering attacks.…
Category: Blog RSS Feed
Strengthening Cybersecurity Incident Response Part 2: From Detection to Recovery
Cyber incidents are always going to be present. Regardless of whether you’re working for a startup or a corporation, malicious software can target you and your business. This is why it’s important to work closely with cybersecurity incident response teams…
The Growing Threat of Ransomware-as-a-Service (RaaS) on Healthcare Infrastructure
According to the 2024 State of Ransomware report by Sophos, there was a 500% increase in ransom bills in the last 12 months. Moreover, an analysis by Comparitech revealed 181 confirmed ransomware incidents targeting healthcare providers in 2024, with 25.6…
The Growing Threat of Ransomware to the Manufacturing Sector
Ransomware has evolved from a distant “I hope it doesn’t happen to us” threat to an insidious, worldwide crisis. Among the sectors most affected is manufacturing, which has found itself more and more in attackers’ crosshairs. Manufacturing has long viewed…
Ransomware Attacks on Critical Infrastructure Surge, Reports FBI
The FBI is set to report that ransomware was the most pervasive cybersecurity threat to US critical infrastructure during the year of 2024. As Reuters reports, complaints of ransomware attacks against critical sectors have jumped 9% over the previous year.…
New Bill Mandates Cybersecurity Overhaul for Federal Contractors
New cybersecurity legislation is coming thick and fast. And for good reason: cyber threats are becoming more sophisticated, systems are becoming more connected, and geopolitical relationships are becoming more fraught. One of the most recent bipartisan legislations – the US…
Scams 2.0: How Technology Is Powering the Next Generation of Fraud
Technology is transforming the way financial scams operate, making them more sophisticated, automated, and harder to detect. From deepfake impersonations to cryptocurrency fraud and tech support scams, bad actors are leaving no stone unturned and are leveraging every advanced tool…
The Bybit Wake-Up Call: Strengthening Crypto Security Before It’s Too Late
The recent Bybit hack, in which bad actors swooped in and made off with $1.5 billion worth of Ethereum, has sent shockwaves through the cryptocurrency industry. As one of the largest digital heists in history, it lays bare the vulnerabilities…
Smart Africa Unveils 5-Year Cybersecurity Plan to Strengthen Digital Resilience
Africa has made huge strides in digital transformation in the past few years. For example, over 160 million Africans gained broadband internet access between 2019 and 2022. As the continent embraces digitalization, cybersecurity is becoming an increasingly pressing concern. Recognizing…
Digital Hygiene in Healthcare: Where Cybersecurity Is a Matter of Life and Death
The healthcare industry is a prime target for cyberattacks due to the significant value of medical data and the critical nature of patient care. Unlike other sectors, healthcare organizations must balance cybersecurity with the need for immediate access to life-saving…
Latest PCI DSS Standards: Use Third Parties – But at Your Own Risk
Third parties have long been the hidden heroes of the payment card industry, providing specialized, streamlined support to merchants looking to host a website or spin up an app. But that convenience is not without a cost. According to PCI…
The Cyber War on Democracy: Lessons from the 2024 RNC Email Hack
In July 2024, as the Republican National Committee (RNC) geared up for its national convention in Milwaukee, Chinese hackers infiltrated the RNC’s email system. According to The Wall Street Journal, attackers maintained access for several months, trying to get their…
US Senators Push for Stronger Cybercrime and Computer Fraud Legislation
It’s been a pretty divisive few months in US politics. The Trump administration has made sweeping changes in almost all areas of policy, ranging from international relations to domestic regulations and everything in between. However, some areas of American politics…
CNSS Instruction: Why It’s Critical for National Security and Your Organization
As cyber threats evolve, so must the strategies and frameworks that protect the data and systems that are at the heart of national defense, intelligence, and security. At a time when cyber threats are becoming more sophisticated, the need to…
APT Rogues’ Gallery: The World’s Most Dangerous Cyber Adversaries
Advanced Persistent Threat (APT) groups are not a new scourge. These sophisticated, state-sponsored cyber adversaries, with deep pockets and highly advanced technical skills, conduct prolonged and targeted attacks to infiltrate networks, exfiltrate sensitive data, and disrupt critical infrastructure. The stakes…
Best Practices for Transitioning from Security to Privacy
As global privacy requirements evolve, many information security professionals are called upon to enhance or lead information privacy programs. While this transition may seem like a natural progression, I learned five important lessons when I moved from a focus on…
Article 7 of GDPR: Preserving Data Integrity in Image Publication
For all the tremendous opportunities that the digitization of business operations has unlocked, there are also complex security and data privacy challenges that organizations have to navigate. In the interests of business privacy and security, legislation exists to hold organizations…
Energy Under Siege: How the Industry is Fighting Against Cyber Attacks
The energy sector has become a prime target for cyberattacks, with successful breaches posing severe risks to national security, economic stability, and public safety. Luckily, the industry is standing up and taking notice, with two-thirds of energy professionals (65%) now…
Ransomware Reaches A Record High, But Payouts Are Dwindling
Shed a tear, if you can, for the poor, misunderstood cybercriminals hard at work trying to earn a dishonest crust by infecting organisations with ransomware. Newly released research has revealed that the riches to be made from encrypting a company’s…
Cyber Fraud: The Primary Culprit in UK Payment Fraud
Cyber fraud has skyrocketed from a growing concern to the leading driver of payment fraud in the UK, infiltrating most businesses in the country and exposing them to previously unimagined financial and operational risks. This was one of the findings…