Category: Cybersecurity Insiders

Saudi Cyber Innovation: Redefining SOC Operations

Launch of COGNNA at RSA 2025 Security teams today face an unstoppable challenge—one that isn’t just about technology but about operational endurance. For years, SOC analysts have been inundated with alerts, struggling with fragmented tools and siloed systems that require…

Mark & Spencer hit by Cyber Attack on Easter

On April 21, 2025, British retail giant Mark and Spencer (M&S) confirmed that it was the victim of a cyberattack that disrupted its contactless payment terminals in over 1,400 of its UK stores. The company reassured customers that both its…

New cryptocurrency creation will lead to more ransomware attacks

In the past two to three years, law enforcement agencies around the world have made significant strides in combating ransomware attacks. These malicious attacks, often involving file-encrypting malware, have wreaked havoc on individuals, businesses, and even entire governments.  However, authorities…

Akira Ransomware shifts focus to SMBs

Many small and medium-sized businesses (SMBs) operate under the assumption that cybercriminals won’t target them, believing their data or systems lack the value to entice hackers. After all, these businesses often can’t afford the hefty ransoms that typically interest cyber…

Emerging cyber threats from Genetic Data

In today’s digital age, cyberattacks are becoming increasingly sophisticated, with hackers targeting not only financial information or personal identities but also more intimate and sensitive data—genetic data. While we have long been aware of the risks to personal information like…

Chinese smartphones now stealing cryptocurrency from wallets

The next time you’re looking for a budget-friendly smartphone, particularly one from a Chinese brand, you might want to proceed with caution. A recent warning from cybersecurity experts at Dr. Web, an anti-virus software company, suggests that purchasing low-cost smartphones…

When Security Gets Too Complicated: A Return to Basics

In the cybersecurity industry, we’ve become obsessed with complexity. Every conference showcase features dazzling new AI-infused solutions, quantum-resistant algorithms, and blockchain-secured systems promising to revolutionize our defenses. Vendors pitch increasingly sophisticated tools with astronomical price tags, and leadership teams eagerly…

Cybersecurity Talent Gap

I love my job This isn’t said sarcastically or trying to convince myself. I genuinely love my job. I love my company and coworkers and the ability to help clients. I think I have the best job out there and…

Breaking the Cycle: Prioritizing Recovery Over Ransom Payments

In 2024, businesses paid $813 million to cyber criminals as the result of ransomware. That’s an astronomical sum, highlighting the immense financial burden cybercrime places on organizations. Rhode Island’s cyberattack of December 2024, where state officials paid out a $5…

Security Gaps Widen: A Perfect Storm for Insider Threats

High-profile cyberattacks involving ransomware, malware, zero-day exploits, and nation-state intrusions dominate headlines. These attacks are bold, disruptive, and external, commanding attention from security teams to detect and stop these threats. Amid the noise, a quieter danger is gaining momentum from…

United Health offers Ransomware Loans

Ransomware attacks have become a significant threat to businesses, often leaving them financially devastated and struggling to stay afloat. Many affected companies find it nearly impossible to recover, eventually teetering on the edge of closure due to the financial burden…

Gaps In Encryption Create Exploitable Vulnerabilities

Data breaches are no occasional crisis – they are a persistent, costly epidemic wreaking global havoc on businesses. While organizations leverage the latest technological advancements in perimeter defense, access management, and cloud and application security, one area that is overlooked…

Zoom Video Conferencing App down by DDoS Attack

Zoom, the widely popular video conferencing platform used by millions of IT professionals, educators, and businesses worldwide, has recently experienced a significant outage. The disruption, which affected users trying to access the service via the app and website, has sparked…

Evolving Threat of Ransomware: From Extortion to Data Poisoning

Over the years, ransomware attacks have become a staple of cybercrime, primarily involving hackers encrypting critical databases and demanding a ransom in exchange for a decryption key. This traditional model of cyber extortion has already caused significant disruption across industries. …

Can Passwordless Tactics Help Thwart Major Cyber Threats?

In the ever-evolving cybersecurity landscape, one age-old vulnerability continues to haunt individuals and organizations alike: passwords. From weak or reused credentials to phishing and brute-force attacks, traditional password-based authentication has proven to be a persistent weak link in the digital…

Crafty Threat Actors Unleash Ingenious Phishing Ploys

Ever feel like phishing scams are on a never-ending quest for supreme deception? From fake delivery notifications to impersonated CEOs, it’s like picking from a basket of tricks – each one meticulously crafted to catch people and organizations off guard.…

DOGE Big Balls Ransomware turns into a big cyber threat

Over the past few years, the cybersecurity landscape has been increasingly dominated by ransomware attacks. These threats have grown more complex, evolving from simple file-encryption schemes to multi-layered extortion tactics. Notably, we’ve seen the rise of double extortion—where attackers not…

DaVita hit by ransomware attack

DaVita, a major player in the kidney dialysis industry, has recently fallen victim to a ransomware attack. Fortunately, there have been no reports of the breach affecting patient-related services as of now. However, the situation could become more concerning if…

Radiant Security Unveils Its Groundbreaking Adaptive AI SOC Platform

In an era where cybersecurity teams face overwhelming alert volumes, staff shortages, and ever-evolving threats, Radiant Security has introduced a transformative solution: the Adaptive AI SOC platform. This innovation promises to revolutionize how security operations centers (SOCs) operate, offering not…

Understanding Multifactor Authentication (MFA): A Simple Guide

In today’s digital world, passwords alone are not enough to keep our online accounts safe. Cybercriminals are constantly finding ways to steal login credentials, whether through phishing scams, data breaches or malware. This is where multifactor authentication (MFA) comes in.…

The Oracle Breach Is Bigger Than You Think—5 Urgent Steps to Take Now

In a troubling development for enterprise cloud users, federal authorities are investigating a major data breach involving Oracle—one of the world’s leading cloud infrastructure providers. Hackers reportedly gained unauthorized access to Oracle systems, stealing sensitive client login credentials including usernames,…

Hackers post stolen data on Telegram

In recent years, we’ve become familiar with ransomware attacks, where hackers infiltrate computer networks, encrypt files, and demand payment in exchange for restoring access. As these cybercriminal tactics evolved, attackers began stealing sensitive data in addition to encrypting it—using the…

RansomHouse ransomware steals 2TB data from telecom giant

Ransomware attacks have been on the rise in recent months, likely due to the ease with which hackers can generate substantial earnings through increasingly aggressive tactics, including double and triple extortion. These methods force victims to not only pay a…

Sensata Technologies hit by a ransomware attack

Ransomware attacks are known to frequently occur over weekends, and Sensata Technologies, a prominent manufacturer of sensors and electrical components for critical applications, recently became a victim of such an attack. According to a filing with the U.S. Securities and…

The Cybersecurity Risk No One Talks About: Poor File Management

Cybersecurity discussions often spotlight phishing scams, ransomware attacks and other external threats. But there’s a foundational risk that quietly underpins many of these issues: poor handling of file uploads and delivery. In 2024, malicious file detections rose 14% over the previous year,…

Cyber Threat to submarine cables in China Sea

For years, global cybersecurity alerts have been issued to safeguard a variety of devices—ranging from personal computers and smartphones to servers and Internet of Things (IoT) devices. Yet, there is a new and unsettling warning gaining traction within tech and…

Clop targets Kellogg and Medusa Ransomware hits NASCAR

Clop Ransomware Targets WK Kellogg Co. in Cyber Attack WK Kellogg Co., now operating as a separate entity from the Kellogg Company, has fallen victim to a cyber-attack, believed to be a ransomware attack. After conducting a technical investigation, the…

The Key Differences Between a Data Breach and a Data Leak

In today’s increasingly digital world, concerns about the safety and security of personal and corporate data are paramount. With high-profile incidents in the media, terms like “data breach” and “data leak” are often used interchangeably. However, there are significant differences…

Navigating AI risks and rewards in cybersecurity

Robert Cottrill, Technology Director at digital transformation company ANS, explores the balance between the benefits of AI and the risks it poses to data security and privacy, particularly for large enterprises. With the UK Government ramping up investment through its…

Cyber Threat emerges from PDF files

Most internet users are familiar with PDF files and the role they play in delivering essential documents in a transferable and readable format across various devices, such as smartphones and computers. Whether it’s a telecom bill, an image, or even…

Identity Management Day Expert Commentary

Alex Quilici CEO of YouMail   This Identity Management Day, be skeptical, not scared. By now, your identity is already out there. Your phone number, job title, connections, even your social security number — all publicly available. The genie is out…

Vishing: The voice scam you need to know about

Cybercriminals are always finding new ways to trick people, and one of the latest scams on the rise is called vishing, short for voice phishing. Unlike email scams (known as phishing), vishing happens over the phone. Recent studies have highlighted…

Can a DDoS Cyber Attack Lead to Political Warfare?

In the world of digitization, cyberattacks have become an increasingly common form of warfare, with Distributed Denial of Service (DDoS) attacks standing out as one of the most prominent and disruptive methods. While often perceived as a technical nuisance that…

Cyber Attacks make UK SMEs loose £3.4 billion a year

Cyberattacks are a persistent and growing threat that cause significant financial strain to victims, whether public or private organizations. However, recent research by Vodafone has revealed a particularly alarming trend: every year, small and medium-sized enterprises (SMEs) are losing nearly…

Google offers AI tool to revolutionize Cybersecurity

For years, businesses have relied on software solutions to help defend against the growing threat of cyber-attacks. However, a new development in the cybersecurity space may soon revolutionize how these threats are mitigated. Google, the technology giant and subsidiary of…

Securely Deploying and Running Multiple Tenants on Kubernetes

Kubernetes has become the backbone of modern cloud native applications, and as adoption grows, organizations increasingly seek to consolidate workloads and resources by running multiple tenants within the same Kubernetes infrastructure. These tenants could be internal teams, or departments within…

Unlocking the Power of Hybrid and Multi-Cloud Environments

Cloud services have revolutionized the way businesses operate, delivering instant access to data, applications and resources at the touch of a mouse. Accessibility through a mix of public cloud services, SaaS applications, private clouds, and on-premises infrastructure has become the…

The Rise of SSE and SASE: What’s Changed from 2024 to 2025?

Introduction The evolution of Security Service Edge (SSE) adoption from 2024 to 2025 reflects significant shifts in enterprise security strategies, cloud adoption, and Zero Trust implementations.  The 2024 SSE Adoption Report outlined the growing demand for SSE as hybrid work…

EvilCorp join with RansomHub to launch global cyber attacks

A new and potentially devastating alliance has emerged in the world of cybercrime. EvilCorp, an infamous cybercriminal group suspected to be led by an ex-FSB officer from Russia, has partnered with RansomHub, a notorious ransomware-as-a-service (RaaS) provider. This collaboration has…

Google Calendar leading to Phishing Scams and Data Thefts

Google Calendar is a widely used tool for scheduling online events, meetings, and sending reminders. However, a concerning new trend has emerged where cybercriminals are exploiting this platform to target unsuspecting victims with phishing scams and attempts to steal sensitive…

New Study Ranks Platforms By Password Reset Frequency

The platform where people forget their passwords the most is YouTube, leading with the highest number of password-related searches. Video streaming users forget their login details the most, with the top platform’s users requesting new passwords over four times a…

Russian Railways hit by DDoS Cyber Attack from Hacker Army

As anticipated, Russian Railways became the target of a large-scale Distributed Denial of Service (DDoS) attack, significantly impacting both its website and mobile application. The cyberattack disrupted online services, rendering them inaccessible to users for an extended period. However, despite…

The Unique Challenges of Securing Agentic AI

Introduction The rise of Agentic AI has become one of the most talked about trends in the AI world. The move to autonomous AI Agents promises to be as big a leap forward as Generative AI was over traditional AI…

Why AI Literacy Matters

We live in a time where technology is changing fast, and artificial intelligence is becoming part of everything we do. It’s showing up in how we work, live, and connect with each other. It is essential that people understand what…

Quantum Sensors: From Lab to Chip Through Semiconductor Fabs

Quantum sensors offer dramatically increased sensitivity compared to their classical incumbents or even enable new sensing capabilities altogether. Multiple industries are expected to benefit from quantum sensing innovations, including atomic clocks, quantum magnetometers, quantum gyroscopes, and more. However, bringing quantum…

Harnessing AI to Strengthen Cyber Teams Amidst Talent Shortage

In a rapidly evolving and increasingly intelligent threat landscape, the cybersecurity industry grapples with a staggering gap between overworked security teams and the protection modern enterprises require, leaving space for cyber attacks to creep in through the cracks. Threat actors…

Cybersecurity in 2025: The Biggest Threats and How to Protect Yourself

The year 2025 is critical for cybersecurity as cyber threats are advancing unprecedentedly. AI-driven attacks, deepfake scams, and state-of-the-art ransomware schemes have become more prevalent. Businesses and individuals must remain vigilant against these emerging dangers. Implementing various security measures, adopting…

Cybersecurity news headlines trending on Google

New Malware Crocodilus Targets Crypto Wallet Credentials Malware gangs are continually evolving their tactics to steal sensitive information, especially in the ever-growing world of cryptocurrency. Recently, a new malware variant called Crocodilus has emerged, specifically targeting mobile users in Spain…