As more businesses move online, establishing an e-commerce channel is essential to meet buyer expectations for speed and convenience. But as more activity is conducted online, businesses face a rising threat that can’t be overlooked: business identity theft. This especially…
Category: Cybersecurity Insiders
2025 Global State of API Security Report – New Data Shows API Breaches Continue to Rise Due to Fraud, Bot Attacks, and GenAI Risks
The landscape of API security is evolving rapidly, driven by increasing complexities in IT environments, the proliferation of third-party APIs, and the rise of generative AI applications. These factors are expanding the attack surface and introducing new vulnerabilities that traditional security…
Cyber Threat by Google searching Bengal Cats legal in Australia
Cybersecurity experts at Sophos are warning Australian internet users about a growing cyber threat related to a specific search term: “Are Bengal Cats legal in Australia.” Researchers from the UK-based cybersecurity firm have highlighted the risk of SEO poisoning, a…
Three trending Cybersecurity news headlines on Google
Elon Musk’s Starlink Satellite Broadband Caught in the Crossfire of 2024 U.S. Election Controversy Elon Musk’s Starlink, a satellite-based internet communication service, has recently found itself entangled in a growing controversy linked to the 2024 U.S. Presidential Election. The company,…
What is Machine Identity Management?
In the rapidly evolving world of digital transformation, security has become one of the most critical challenges for organizations. While much attention has been focused on securing human identities, a growing concern is the protection and management of machine identities.…
Third-Party Risk Management: The Top 7 Predictions for 2025
With the new year fast approaching, organizations are beginning to plan for 2025 and draft budgets to help these plans come to fruition. Managing risk was central last year in both planning and budgeting – and there is no sign…
Detect and Destroy APTs with Crystal Eye TDIR
Red Piranha is a leading developer & manufacturer of premium Cyber Security products in Australia. Red Piranha is also an official member of Team Defence Australia that promises to deliver advanced cybersecurity capabilities to its clients. By using automation, world-class…
CFPB Rule Changes Presents New Open Banking Challenge – Ensuring Compliance with API Standards
Application programming interfaces (APIs) play a crucial role in modern business, particularly for banks, retailers, and global enterprises, by streamlining financial data transfers. In the financial industry, APIs offer significant advantages, such as reducing IT complexity and simplifying processes for…
Unleashing the Power of Purple Teaming: A Collaborative Approach to Cybersecurity
The traditional cybersecurity landscape separated the functions of attack simulation (red teams) and defense (blue teams), with each operating independently. While valuable, this approach can leave organizations vulnerable due to missed communication and a lack of understanding of the attacker…
Fortinet Expands Generative AI Integration Across Cybersecurity Portfolio to Enhance Security Operations
Fortinet® (NASDAQ: FTNT), a global leader in cybersecurity, has broadened its application of generative AI (GenAI) technology across its suite of products by introducing two new capabilities through FortiAI, the company’s GenAI-powered security assistant. These latest enhancements are aimed at…
AsyncRAT’s Infection Tactics via Open Directories: Technical Analysis
ANY.RUN, a leader in interactive malware analysis and threat intelligence, has released a technical analysis authored by RacWatchin8872 documenting new techniques used in multi-stage attacks involving AsyncRAT. The report details how attackers exploit open directories to distribute AsyncRAT, examines the…
American Oilfield supplier Newpark Resources hit by ransomware attack
Newpark Resources, a Texas-based company providing essential tools and services to the oil and gas industry, as well as the construction sector, was recently targeted in a ransomware attack that disrupted its financial and operational analytics systems. The attack, which…
New Malware “ToxicPanda” Targets Android Devices to Steal Banking Information
A newly discovered malware, dubbed ToxicPanda, has recently been making headlines for its dangerous activities targeting Android phone users. This sophisticated piece of malware is specifically designed to steal sensitive financial information, primarily targeting users’ bank account details. ToxicPanda operates…
Google Cloud makes MFA mandatory for all global users by 2025
As the frequency and sophistication of cyberattacks on cloud platforms continue to rise, leading service providers are taking significant steps to bolster security and protect user data. Google, the global leader in search and cloud services, has announced a major…
Meeting CISA’s Memory Safety Mandate: The Role of OT Software Buyers and Manufacturers
Over the past several years, CISA, the Cybersecurity and Infrastructure Security Agency, has released a steady stream of guidance encouraging software manufacturers to adopt Secure by Design principles, reducing customer risk by prioritizing security throughout the product development process. This…
SonicWall Unveils Cutting-Edge Security Solution for Branch and Small Office Environments
On Thursday, November 7, SonicWall is set to unveil a new security solution crafted to meet the specific needs of branch offices and small office/home office (SOHO) setups. With its robust, cost-efficient blend of networking, access, and security capabilities, this…
PRODUCT REVIEW: TXONE NETWORKS FOR PROACTIVE OT DEFENSE
Securing Operational Technology (OT) in today’s industrial environments has never been more challenging, with blind spots like unmanaged legacy assets, transient devices, and unauthorized USBs presenting significant vulnerabilities. To make things worse, OT systems often rely on older, specialized equipment…
Real-Time Protection: How Deep Packet Inspection Enhances Detection and Response
If you want to stay healthy and live a long and prosperous life, you don’t just visit the doctor annually so they can listen to your heart and lungs; you also follow up with lab work to check cholesterol and…
Telegram new content surveillance policy and Cyber Attack on South Korea Defense
Telegram to Cooperate with Law Enforcement on User Data Requests Telegram, once a preferred communication platform for cybercriminals due to its lack of content moderation or monitoring, is set to change its stance. In a move to comply with legal…
Using Human Risk Management to Detect and Thwart Cyberattacks
No matter how strong your defenses may be, determined bad actors will likely find a way to break in. Beyond preventing infiltration, organizations must also employ methods that can identify the presence of bad actors in the network after a…