Category: Cybersecurity Insiders

Possible Cyber Attack on 911 of 4 American States

The 911 emergency services experienced a significant outage in four states—Nebraska, South Dakota, Texas, and Nevada—sending shockwaves through the affected communities. Speculation points to a cyber attack orchestrated by Chinese intelligence, targeting all 50 states. However, only nine states were…

Microsoft and Google are top brands misused to scam users

Online users are increasingly becoming targets of phishing attacks, with hackers exploiting the names of leading technology companies to lure unsuspecting victims into scams that result in financial loss or malware infections. According to research from Check Point technology, scammers…

Microsoft and Google are top companies to scam users

Online users are increasingly becoming targets of phishing attacks, with hackers exploiting the names of leading technology companies to lure unsuspecting victims into scams that result in financial loss or malware infections. According to research from Check Point technology, scammers…

FTC slaps penalty for leaking sensitive health data to Facebook

The Federal Trade Commission, also known as the FTC, recently announced a significant settlement with the health firm Cerebral, requiring the company to pay $7,000,000 for mishandling patient information and inadvertently sharing sensitive details with advertising companies, such as Facebook.…

The Digital Future Needs Cybersecurity Leaders

We’re sure you have heard this before: the rate of technological change is accelerating. It is unpredictable and unprecedented. As the World Economic Forum acknowledges, the fourth industrial revolution brings “developments in previously disjointed fields such as artificial intelligence and…

Cyber Threat from Remember Me Checkbox

When logging into various online accounts, we often encounter a “Remember Me” checkbox, allowing us to stay logged in until we close and reopen the tab. This feature streamlines the login process and enhances convenience for users. However, what happens…

How to Safeguard Your Data Through Security Awareness Training?

Cyber threats are not only escalating in frequency but also growing more sophisticated, highlighting the indispensable role of cybersecurity awareness for both individuals and businesses. As cybercriminals employ increasingly advanced tactics, IT security awareness training becomes a pivotal defense mechanism. …

Streaming service ROKU witnessed 500K customers data leak

Roku, a leading provider of streaming services boasting approximately 80 million accounts, has confirmed a second cyber attack occurring in March of this year, potentially affecting around 500,000 of its customers. This incident stands distinct from the earlier attack in…

US House bill prohibits ransomware payments over $100,000

The US House of Representatives is on the brink of passing a significant bill aimed at curbing the scourge of ransomware attacks by prohibiting payments exceeding $100,000. The primary objective is to safeguard the nation’s financial infrastructure from the growing…

YouTube being used by hackers to spread Malware

When you’re casually browsing through YouTube channels and encounter a tempting link in the description, think twice before clicking. There’s a rising trend where these links can lead unsuspecting users straight into the jaws of malware. As the demand for…

2024 Cybersecurity Excellence Awards – Extended Deadline

Great news: By popular demand, we extended the deadline for the 2024 CYBERSECURITY EXCELLENCE AWARDS until April 27,2024. In the complex and dynamic world of cybersecurity, excellence often goes unnoticed. That’s where the Cybersecurity Excellence Awards come in. This isn’t just…

How information can be protected in hotel data breaches

In today’s flexible holiday landscape, where travelers enjoy getaways at various times of the year, the hospitality industry thrives. However, recent incidents like the cyber-attack on Omni Hotels underscore the importance of safeguarding guest data. Here are some key measures…

2024 Insider Threat Report Trends, Challenges, and Solutions

Introduction   Insider threats, driven by personal motivations and enabled by the rapid evolution of technology and changing  hybrid work environments, present a critical challenge to organizational security. Addressing these threats  necessitates a sophisticated, multi faceted approach that combines advanced…

Will Quantum Computing Change the Way We Use Encryption?

[By Jerry Derrick, Camelot Secure] Today, encryption is a cornerstone of our cybersecurity practices. It protects everything from cell phones and SMS messages to financial transactions and intellectual property. However, a new challenge in the complex landscape of encryption has…

Apple issues warning against Mercenary Spyware

Apple Inc has recently updated its threat notification system to include alerts for Mercenary Spyware targeting individuals and companies. Previously, starting from March 2021, Apple had been issuing alerts to users whose devices were targeted by state-sponsored attacks, a response…

The ClickOps Era Has Begun—Here’s a Quick Primer

[By Prashanth Nanjundappa, VP, Product Management, Progress] In the last decade, the codification and spread of DevOps best practices have transformed the day-to-day workings of businesses worldwide. Where development and operations were once needlessly siloed, they are now more closely…

Google top trending cybersecurity news headlines

Greylock Mckinnon Associates Data Breach Exposes Sensitive Information of 340,000 Individuals A significant cybersecurity incident has affected a defense contractor contracted by the Department of Justice (DoJ), resulting in the exposure of sensitive data belonging to over 340,000 individuals. The…

Google workspace to use AI for Data Security

Google has recently announced a significant upgrade to its Workspace platform, integrating cutting-edge Artificial Intelligence (AI) technology to enhance meetings and bolster data security. With this advancement, Gemini, Google’s AI-powered assistant, is set to revolutionize the experiences of over 3…

Ransomware threat to diminish in this year 2024

Exciting news arrives amidst the relentless surge of ransomware assaults that have plagued individuals and corporations, escalating into double and triple extortion schemes, instigating apprehension among internet users. However, a glimmer of hope emerges from the latest findings of a…

Cybersecurity Incidents Making Headlines on Google

Panera Bread Falls Victim to Ransomware Attack: Panera Bread, a popular chain of restaurants, recently faced a significant setback as it was targeted by a ransomware attack leading to a week-long IT outage. The attack, which was identified on March…

Avoiding Cloud Breaches: Top 5 Misconfigurations to Watch For

In today’s digital landscape, the migration to cloud computing has revolutionized how businesses operate, offering unparalleled flexibility, scalability, and efficiency. However, with great power comes great responsibility, and the improper configuration of cloud environments can lead to devastating data breaches.…

Hoya suffers a suspected ransomware attack

HOYA Corporation, a prominent Japanese brand known as the world’s second-largest optical manufacturer, has recently been targeted in a cyber attack suspected to be ransomware-related. Initially attributed to a system failure by company authorities, subsequent disruptions in other business subsidiaries…

Stream.Security Releases Suite of Next-Gen Features

Advanced Exposure Investigation and AI-Powered Remediation Capabilities Now Available    TEL AVIV – March 28, 2024 – Stream.Security, a leading platform for cloud solutions specializing in real-time digital twin technology, announced today the release of new advanced threat investigation and…

FBI shares some valuable insights on ransomware

The FBI, America’s premier law enforcement agency, has released a comprehensive report shedding light on the ongoing ransomware threat landscape. Here’s a summary of the key insights: Intermittent Encryption Tactics: Notably, the report highlights a common tactic among the top…

Seven tips to find spyware on a smart phone

To determine if your phone has spyware installed, you can follow these steps: 1.Check for Suspicious Apps: Review the list of installed apps on your phone. Look for any unfamiliar or suspicious apps that you don’t remember downloading. Spyware often…

Omni hotels hit by a possible ransomware attack

Omni Hotels, a Texas-based resort chain, has announced that some of its IT systems are experiencing technical difficulties, resulting in slowed or intentionally shut down digital services. While the incident is still under investigation, there are indications that it may…

Exploring the Threat of Data Poisoning in Cybersecurity

In today’s digitally driven world, data is often referred to as the new currency. With the exponential growth of data collection and utilization, ensuring its integrity and security has become paramount. However, amidst the efforts to safeguard data, a lesser-known…

Know the significance of World Cloud Security Day

Many individuals within the cloud industry may not be aware of World Cloud Security Day, which has been observed since 2019 on April 3, 2024. This significant day serves as an opportunity to raise awareness about the importance of safeguarding…

Ransomware criminals target backups for assured ransom

In recent times, the importance of maintaining efficient data backups as a defense against ransomware attacks has been repeatedly emphasized by security experts and law enforcement agencies. However, what happens when even these backups fall victim to encryption or deletion?…

The Future of Defense in an Era of Unprecedented Cyber Threats

[By Darren Guccione, CEO and Co-Founder, Keeper Security] Cyber attacks are becoming increasingly sophisticated as malicious actors leverage emerging technology to conduct, accelerate and scale their attacks. With AI-powered attacks at the helm, today’s IT and security leaders must contend…

Cybersecurity news headlines trending on Google

AT&T Acknowledges Data Breach AT&T, one of America’s leading telecom brands, has confessed to a significant data breach, revealing that sensitive information pertaining to millions of customers has been leaked onto the dark web. This breach has raised concerns about…

Google new Password Manager raises security concerns

Google, the pioneering service that originated with Gmail and marked its 20th anniversary on April 1st, 2024, has unveiled a new feature named ‘Password Manager.’ This service allows users to seamlessly transfer their passwords from their mobile devices to other…

What is innovative frictionless security

Innovative frictionless security refers to cutting-edge approaches and technologies that prioritize both security and user experience by minimizing or eliminating the barriers and inconveniences traditionally associated with security measures. At its core, frictionless security seeks to strike a balance between…

Meet the Phishing service platform named Darcula

Cybersecurity analysts at Netcraft, an internet service company based in London, have recently uncovered a sophisticated phishing platform dubbed ‘Darcula.’ This platform, known as a phishing-as-a-service (PhaaS) operation, provides users with template-based guidance for setting up phishing websites. What sets…

Hot Topic customers targeted by Credential Stuffing attacks

Hot Topic, the American fashion retailer, experienced two waves of credential stuffing attacks in November of the previous year. Investigations have revealed that these attacks resulted in the leakage of customer information, including partial payment data. Credential stuffing involves hackers…

NHS patient data published on the Dark Web

In a concerning development, a well-known ransomware collective known as INC Ransom has recently disclosed a portion of pilfered data linked to the UK’s National Health Service (NHS) on the obscure corners of the internet known as the dark web.…

The human-AI partnership: a guide towards secure coding

[Pieter Danhieux Co-Founder and CEO, Secure Code Warrior] The doomsayers are, so far, losing the argument. The panic around AI replacing humans has been countered with a new narrative: “Let AI redefine your job rather than replace it.” According to…

Ransomware attack on Big Issue and University of Winnipeg

The Qilin Ransomware group is under scrutiny for breaching the servers of the UK-based newspaper ‘The Big Issue Group.’ Reports indicate that the perpetrators successfully accessed confidential data from the victim and are now holding the entire database hostage, encrypting…

New Zealand accuses China for hacking the Parliament

After the United Kingdom’s purported accusation against China of launching a cyber attack on its Electoral Commission in 2021, allegedly aimed at stealing data pertaining to over 40 million voters, New Zealand (NZ) government has directly pointed fingers at China…

Medusa Ransomware group demands $700k from victims

Tarrant Appraisal District (TAD), a governmental entity in Texas, has made headlines due to a sophisticated cyber attack suspected to be orchestrated by the Medusa Ransomware group. The incident came to light on March 24th, 2024, prompting an emergency meeting…

Understanding the Various Types of DDoS Attacks and Their Implications

In today’s interconnected digital world, Distributed Denial of (DDoS) attacks have emerged as a significant threat to online businesses, organizations, and even individuals. These attacks can disrupt essential services, compromise sensitive data, and incur substantial financial losses. Understanding the different…

Over 40m UK voters personal data breached in hack by China

In an unprecedented move, the United Kingdom’s government is poised to publicly accuse China of orchestrating a cyber breach into its Electoral Commission’s database. The breach, occurring between August 2021 and October 2022, saw over 40 million voter records compromised.…

Will AI augment or annex cybersecurity jobs?

By Jamal Elmellas, Chief Operating Officer, Focus-on-Security Generative AI is expected to impact 60% of jobs in advanced economies like the UK according to the International Monetary Fund (IMF), half of which will gain from enhanced productivity while the other…

Privacy concerns makes Airbnb ban security cameras indoors

Installing CCTV cameras has become a common practice in today’s society, offering a sense of security and providing potential video evidence in legal situations. However, concerns over privacy have emerged as some cameras are perceived as overly intrusive. In response…

Russia bans Microsoft followed by Amazon and Google

Russia implemented a sweeping ban on Microsoft Cloud services on March 20th, with plans to extend the prohibition to Google and Amazon web services in the coming weeks. While security analysts cite national security concerns as the primary motive, trade…

Unraveling the Cyber Threats Lurking Behind QR Codes

QR codes, once a simple tool for scanning and accessing information swiftly, have become a ubiquitous feature in our digital landscape. From restaurant menus to promotional materials, these square barcodes offer convenient access to websites, apps, and multimedia content with…

Now FCC endorses IoT products with Cyber Trust Mark Logo

The Federal Communications Commission, or FCC, is on the verge of introducing a cybersecurity labeling system for Internet of Things (IoT) products. This initiative aims to provide consumers with a clear indication of which smart devices meet basic cybersecurity standards.…

Five Steps to Overcoming Cyber Complacency

[By Mike Toole, Head of IT and Security at Blumira] It’s no secret that news about breaches and cyberattacks emerge daily. As a result of this constant exposure, even the most dedicated professionals understandably experience “data breach fatigue” and become…

Kate Middleton Medical Record Data was hacked

The Princess of London, Kate Middleton, has been undergoing treatment for undisclosed health issues at ‘The London Clinic’ in recent weeks. However, reports from the Daily Mail suggest that hackers or a hacking group attempted to breach the medical data…