Category: Cybersecurity Insiders

Catfishing via ChatGPT: A Deep Cybersecurity Concern

The rapid advancement of artificial intelligence (AI) and natural language processing technologies has revolutionized the way we interact online. Tools like ChatGPT, which leverage deep learning models to generate human-like responses, have become commonplace in various fields—ranging from customer service…

The Cybersecurity Gap Is No Longer Talent—It’s Tempo

It sounds like an exercise in theory: what if a researcher could prompt an AI to reverse-engineer a vulnerability, locate the patched commit, and generate a working exploit—all in a single afternoon? But that’s exactly what security researcher Matt Keeley…

Ransomware attack on UK Food Distributor to supermarkets

In a troubling development, a new victim of ransomware has emerged today, targeting a key food distributor that supplies refrigerated goods and groceries to major UK supermarket chains, including Tesco, Aldi, and Sainsbury’s. This follows a string of similar incidents…

The End of VPNs — Part 2: Beyond the Buzz of Zero Trust

[Part 2 of 2 – Based on an interview with Zscaler CSO Deepen Desai] By Holger Schulze, Cybersecurity Insiders “Zero Trust isn’t a feature,” Deepen Desai told me during our RSA Conference interview. “It’s an architectural decision to stop trusting…

Engineering Calm in Crisis: Lessons from the Frontlines of Security

High-pressure incidents can be defining moments for organizations, demanding immediate, coordinated, and often high-stakes responses. In the realm of cybersecurity, where threats evolve rapidly and stakes include sensitive data, reputational damage, and financial loss, the pressure to act quickly is…

Honeypots become a strategic layer in cyber defence

J2 Software has introduced ‘Honeypot as a Service’, a plug-and-play solution designed to deceive attackers, gather critical threat intelligence, and ultimately strengthen an organisation’s cyber resilience. This new approach is particularly crucial as cyberattacks become more complex and targeted. A…

How a Turing Test Can Curb AI-Based Cyber Attacks

In recent years, artificial intelligence (AI) has emerged as a powerful tool, revolutionizing industries from healthcare to finance. However, as AI’s capabilities continue to grow, so does its potential for misuse—especially in the realm of cybersecurity. One of the most…

Criminal records exposed in cyber attack on Ministry of Justice

The recent cyber-attack on the UK’s Ministry of Justice (MOJ) has raised significant concerns, particularly when considering the potential long-term consequences of this breach. Preliminary investigations suggest that hackers successfully accessed and compromised approximately 2.7 million sensitive records, including criminal…

SafeLine WAF: Best Security Choice for Small Businesses

As a website owner, one of my top priorities is to ensure that my website is protected from cyber threats. After trying various web application firewalls (WAFs), I recently discovered SafeLine WAF, and I’m thoroughly impressed. If you’re looking for…

How to identify hackers sitting in a computer network

Cybersecurity threats are an ever-present danger in today’s interconnected world, and one of the most insidious types of breaches involves hackers gaining access to a computer network and remaining undetected for long periods. These attackers, often referred to as “advanced…

Ransomware attacks on education sector go unreported for months

Countries like the United Kingdom, the United States, Australia, and Canada have established cyber laws that require organizations affected by ransomware attacks to report these incidents within a specific time frame. These mandatory reporting windows typically range between 48 to…

Dior likely hit by ransomware attack

In a concerning development, Dior, the iconic French luxury fashion brand, has reportedly been targeted by a cyber attack that appears to be a form of ransomware. According to the latest updates, hackers seem to have gained unauthorized access to…

Insider Threat fetches $400m loss to Coinbase

Coinbase, one of the leading cryptocurrency exchanges in the United States, has been the target of a significant cyber attack, potentially leading to losses ranging from $180 million to $400 million in the current financial year. This forecast comes from…

AI Is Already in Your Org—Are You Securing It All?

It’s been impossible to avoid the buzz around generative AI, especially since ChatGPT took the world by storm. And while tools like DeepSeek, Mistral, and LLaMA are reshaping the open-source frontier, one thing is certain: generative AI is here to…

INE Security Alert: Top 5 Takeaways from RSAC 2025

Cary, North Carolina, 13th May 2025, CyberNewsWire The post INE Security Alert: Top 5 Takeaways from RSAC 2025 first appeared on Cybersecurity Insiders. The post INE Security Alert: Top 5 Takeaways from RSAC 2025 appeared first on Cybersecurity Insiders. This…

Malware emerging from AI Video generation tools

AI-generated video content is gaining popularity, particularly among younger audiences. However, this growing trend has also caught the attention of cybercriminals, who are now leveraging these platforms to distribute malicious software. One such threat that has recently emerged is the…

Why Traditional Vulnerability Management Fails in the Cloud

Traditional vulnerability and application security tools are failing in cloud-native environments. It’s not that these tools aren’t good at what they do. The fact is, they weren’t designed for the particular challenges presented by dynamic cloud environments. These tools rely…

The CVE Crisis: Why Reactive Patching is Obsolete

The rapid escalation of Common Vulnerabilities and Exposures (CVEs) has become a critical concern for security teams. Five years ago, approximately 50 new CVEs were identified daily. Today, that number has surged to roughly 140. This unabated increase in vulnerabilities…

What should we learn from International Anti Ransomware Day

International Anti-Ransomware Day is observed annually on May 12th, following its official declaration by INTERPOL in 2022. The day serves as a crucial reminder for businesses to maintain updated data backups and have a disaster recovery plan in place—measures that…

No cyber threat to India ATMs from Pakistan Ransomware Attack

In recent days, relations between nuclear-armed neighbors India and Pakistan have become increasingly tense following a terrorist attack in Pahalgam, Jammu and Kashmir. The Indian government, under the leadership of Prime Minister Narendra Modi, launched “Operation Sindoor” earlier this week…

The Rising Sophistication of Social Media Spoofing

Social media platforms have become essential to our everyday communication for both personal use and professional business operations. Platforms such as LinkedIn, Instagram, and Facebook are widely used by organizations for marketing objectives, helping communicate brand messaging and attracting potential…

Still Running Windows 10? Cybercriminals Thank You.

When Windows 10 support ends on October 14, 2025, unpatched vulnerabilities will become permanent entry points for cybercriminals. After Windows 7 lost support, malware infections surged by 125%—Windows 10 users can expect a similar wave of attacks. In 2023, the…

Ransomware news headlines trending on Google

LockBit Ransomware Gang Becomes Victim of Data Breach The infamous LockBit ransomware group, known for its double extortion tactics and involvement in high-profile cybercriminal activities, has itself fallen victim to a significant data breach. The attack has resulted in the…

CISO Global Shifts to SaaS Cybersecurity Platform

Leading cybersecurity provider CISO Global (NASDAQ: CISO) is entering a new phase of growth, pivoting toward high-margin, recurring-revenue software offerings that complement its managed and professional services. According to a recent Zacks report, the company has launched multiple proprietary software…

Top 10 Cloud Security Mitigation Tactics

As businesses continue to migrate operations and data to the cloud, securing cloud environments has become more critical than ever. Cloud security threats are dynamic and complex, making proactive mitigation tactics essential to protect sensitive data, ensure compliance, and maintain…

The distinction between Data Privacy and Data Security

In today’s digital age, where vast amounts of personal and business information are shared and stored online, two terms often come up: data privacy and data security. While they are closely related and essential for protecting sensitive information, they refer…

AI vs. the Human Mind: The New Ransomware Playbook

Ransomware has always relied on the psychological levers of fear, urgency, and shame to pressure victims. But the rules of engagement are changing.  Cybercriminals are leveraging AI to ratchet up the pressure with more convincing, manipulative techniques, using everything from…

Strengthening Cybersecurity in the Vulnerable Educational System

School systems may not immediately come to mind as targets for cybersecurity attacks. However, threat actors have increasingly turned their attention to them, recognizing that the extensive digital infrastructure supporting schools contains a wealth of sensitive information that can be…

Stealth Tunnels: The Dawn of Undetectable Remote Access

In today’s world, more employees work from home, coffee shops, or satellite offices than ever before. While remote access tools like VPNs have kept us connected, they’re increasingly easy for network gatekeepers to spot—and sometimes block or slow down. Enter…

Why Modern Businesses Need Cyber Threat Intelligence

Every seasoned professional knows that effective cybersecurity rests on knowledge. You cannot counter attacks unless you know how they work and what they target. That’s why enterprises rely on cyber threat intelligence that delivers essential insights to power their security…

New Cyber threats emerge from Cyber Attacks on UK Companies

Over the past two weeks, media outlets have been rife with speculations about a significant cyber attack affecting three major UK-based companies: Marks & Spencer, Harrods, and Co-Op. Reports suggest that cybercriminals infiltrated these organizations, resulting in severe data breaches…

Crypto Agility: Preparing for the Post-Quantum Shift

Many enterprises believe their encryption is secure—until a new threat proves otherwise. Quantum computing and evolving cryptographic risks are forcing security teams to rethink their defenses before it’s too late. Cybercriminals are already harvesting encrypted data, storing it for future…

Cyber Attack on British Co-Operative Group

The Co-Operative Group, commonly known as Co-Op, has issued an official statement confirming that some of its systems were recently targeted in a cyber attack. The retailer, which operates in a variety of sectors including food retail, funeral services, and…

Akira Ransomware attack on Hitachi Vantara Servers

Hitachi Vantara, the global technology powerhouse and a subsidiary of Japan-based Hitachi, was targeted by the notorious Akira Ransomware gang last weekend, forcing the company to take drastic measures. In a bid to contain the spread of the malware, Hitachi…

What is Slopsquatting and is it a New Emerging Cyber Threat?

In the ever-evolving landscape of cybersecurity, new types of threats are constantly emerging. One relatively new tactic that has been gaining attention is slopsquatting, a technique that cybercriminals use to exploit common human errors and vulnerabilities in domain names. But…

Essential Cloud Security Practices Every User Must Follow

As businesses and individuals increasingly rely on cloud services for storage, collaboration, and computing power, the importance of securing cloud environments has never been more critical. Cloud computing offers numerous advantages, including scalability, accessibility, and cost-efficiency. However, with these benefits…

Enhancing Blue Team Defense: The Power of AI

AI is transforming cybersecurity on both sides of the battle. As threat actors use AI to enhance and amplify their attacks, the Blue Teams responsible for identifying security threats in the operating environment are exploring how to leverage large language…

FBI confirms $16.6 billion losses to cyber-crime in 2024

The FBI (Federal Bureau of Investigation), the United States’ premier law enforcement agency, has recently published its Internet Crime Report for 2024, revealing a staggering loss of approximately $16.6 billion from cybercrimes. These figures reflect the volume of complaints reported…

Cyber insurance providers: Friends not foes

The relationship between an insurance provider and the insured is often described as adversarial: one party reluctantly pays a premium, while the other is reluctant to pay out if possible. But cyber insurance doesn’t have to be this way. The…

Cybersecurity Blogs: What You Should Know in 2025

There are many blogs about cybersecurity. Some blogs are for people who are not experts. They help you learn how to stay safe online. Other blogs are for professionals who work in cybersecurity. These blogs talk about deep topics like…