Picture this: A young computer scientist accidentally stumbles into a live hacking event and walks away having found vulnerabilities in Uber’s system. This isn’t the plot of a tech thriller – it’s the real-life story of Dr. Katie Paxton-Fear, age…
Category: Cybersecurity Insiders
How Kyocera’s CISO tackles the threat of cyber risk during AI adoption
Kyocera CISO Andrew Smith explains how he’s responded to the cyber risks associated with AI and how businesses can start implementing it. Ever since AI’s meteoric rise to prominence following the release of ChatGPT in November 2022, the technology has…
SIGNAL denies access to user data in Sweden, reverse of what Apple has done
SIGNAL, the encrypted messaging platform based in California, USA, has made a significant announcement regarding its plans to exit Sweden. The reason for this decision stems from the Swedish government’s demands for access to a backdoor into the platform, allowing…
Fortifying the Nation’s Cybersecurity Posture in a New Administration
Cybersecurity and resilience have grown in priority for both the public and private sectors as threat surfaces reach unprecedented scales and threat actors gain new capabilities. The growing scale and complexity of cyber-attacks not only pose a threat to national…
LockBit ransomware gang sends a warning to FBI Director Kash Patel
Recent reports circulating on social media suggest that FBI Director Kash Patel has been targeted by the infamous LockBit ransomware group. According to sources, the gang warned Patel that he is surrounded by subordinates who seem more focused on manipulating…
Personal data of over 3 million US populace leaks in a data breach
Data breaches have become increasingly common in recent years, yet the level of concern surrounding these information leaks has grown significantly. One such breach that has recently come to light involves DISA Global Solutions, a company that provides vital services…
Fortifying Financial Services Cybersecurity with Threat Intelligence and Cybersecurity Automation
The World Economic Forum’s Global Cybersecurity Outlook 2025 Insight Report paints a bleak picture of what the year ahead holds for technology security teams worldwide. However, some industries are likely to be worse off than others. The financial sector, for…
Ransomware hackers are more interested in data exfiltration than encryption
As ransomware attacks gained popularity, hackers initially focused on encrypting entire databases and demanding ransom in exchange for decryption keys. However, recent trends suggest a shift in their tactics, with cybercriminals now more interested in stealing data rather than encrypting…
Can Passwordless Tactics Help Thwart Major Cyber Threats?
In today’s digital landscape, cybersecurity has become an ongoing concern for organizations and individuals alike. As cyberattacks evolve in sophistication, one of the most significant vulnerabilities remains the traditional password-based authentication system. Passwords, once a cornerstone of online security, are…
AI is coming for your passwords – better make them strong
Weak passwords, as various studies have shown, can be cracked in a second, but now AI can crack even stronger ones in the same amount of time. Language models can and will be used to brute force passwords and organize…
Orange data breach details after HellCat Ransomware Attack
Orange Group, a telecom services provider based in France, has confirmed that one of its internal systems at its Romanian branch was breached by a cyber attacker identified as “Rey,” an individual reportedly associated with the HellCat ransomware group. The…
The 10 Best Email Encryption Options for Enterprises in 2025
Email encryption is an essential protection for modern businesses. The software market has adapted to this need, so leaders have a broad range of potential solutions available to fill the gap. But what are the best email encryption options for…
How healthcare cyber risk teams can plan ahead for HIPAA’s Security Rule update
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health data processors and clearinghouses to protect the confidentiality and security of electronic public health information (ePHI).…
How Skills-Based Hiring Can Help Combat Cybersecurity Skills Shortages
As industry grows more technologically advanced by the day, and as more organizations of all types turn to cyber solutions to support or in some cases wholly operate their network security functions, the greater the need becomes for skilled cybersecurity…
Zero Trust, Maximum Impact: Strategies from Leading Federal Agencies
As federal agencies move beyond the Office of Management and Budget’s (OMB) September 2024 zero trust implementation deadline, achieving comprehensive zero trust remains an ongoing endeavor. While all agencies continue working toward this critical cybersecurity mandate, a select group has…
Overcoming Critical AI Security Risks Uncovered in DeepSeek-R1
DeepSeek has taken the AI world by storm, surpassing ChatGPT as the most downloaded smartphone app and gaining rapid adoption due to its efficiency and accessibility. While its advancements in AI reasoning and performance optimization are impressive, security researchers, including…
INE Secures Spot in G2’s 2025 Top 50 Education Software Rankings
Cary, NC, 25th February 2025, CyberNewsWire The post INE Secures Spot in G2’s 2025 Top 50 Education Software Rankings appeared first on Cybersecurity Insiders. This article has been indexed from Cybersecurity Insiders Read the original article: INE Secures Spot in…
Google to replace SMS authentication with QR Codes for enhanced Mobile Security
Google is strengthening online security by transitioning from SMS-based authentication codes to more secure QR codes, providing a robust defense against current cyber threats. This shift comes as SMS codes, traditionally used for two-factor authentication (2FA), have proven to be…
Top Mobile Security Courses for App Developers
As the demand for mobile applications continues to soar, so does the importance of ensuring their security. With cyber threats becoming increasingly sophisticated, app developers must stay ahead of potential vulnerabilities and protect user data from malicious attacks. For developers…
Kaspersky ban across Australia government agencies
In June of last year, under the leadership of then-President Joe Biden, the United States became the first nation to implement a sweeping ban on Kaspersky products and services, prohibiting their use across all federal agencies. This move, driven by…