Hackers have ventured into a novel business tactic that pledges to delete data stolen by ransomware attackers, offering a dubious assurance to victims in exchange for a modest fee, typically ranging from 1-2 BTC. The modus operandi involves certain ransomware…
Category: Cybersecurity Insiders
Vodafone network not down by Cyber Attack
When Vodafone users in the UK found themselves grappling with network downtime on their mobile phones, a segment of them turned to various social media platforms to express their frustration. While many were eager to learn when normal network services…
Protecting Your Digital Space: A Guide on How to Stay Cyber Safe on Social Media
In the age of digital inter-connectedness, social media has become an integral part of our daily lives, enabling us to connect, share, and communicate globally. However, with the convenience and benefits come potential risks to our cybersecurity. As cyber threats…
PRODUCT REVIEW: ENEA QOSMOS THREAT DETECTION SDK
The evolution of network environments towards distributed, cloud-centric architectures in the work-from-anywhere era has brought unique challenges to network security. The industry’s shift to comprehensive cloud-based services like Secure Access Service Edge (SASE), Security Service Edge (SSE), and Secure SD-WAN…
The Evolution of Authorization Controls: Exploring PBAC and Its Benefits
[By Gal Helemski, co-founder and CTO at PlainID] There has been a substantial trend toward improvement of authorization capabilities and controls. Policy Based Access Control (PBAC) provided by advanced authorization and access control system is progressively displacing more basic and traditional…
Deep dive into synthetic voice phishing (vishing) defense
In a survey conducted by TrueCaller Insights, it was revealed that over 68,000 Americans fell victim to financial fraud through phone scams in 2022. Voice phishing attacks are an escalating threat and this alarming statistic highlights a pervasive lack of…
How to smartly tackle BlackCat Ransomware group
In 2023, the BlackCat, also known as ALPHV ransomware group, achieved remarkable success by nearly accumulating $700 million through the encryption of databases. Among its victims were three Fortune 500 companies, numerous financial institutions, and businesses in the hospitality sector,…
What CISOs Need to Know About Data Privacy in 2024
[By Daniel Barber, CEO and founder, DataGrail] Data privacy is a volatile market. While consumers continue to demand stronger personal data protections, companies are scrambling to keep track of an ever-evolving patchwork of applicable laws and regulations. In this environment, cybersecurity professionals…
REVIEW: ISC2 CERTIFIED CLOUD SECURITY PROFESSIONAL (CCSP) CERTIFICATION
The Certified Cloud Security Professional (CCSP) is a highly respected cybersecurity certification that addresses the needs of professionals and employers for robust and adaptable cloud security expertise. As cyber threats continue to escalate, the demand for skilled cloud security professionals…
Ransomware hackers threaten to send SWAT teams to victimized patients
In recent times, cybercriminals have shifted their tactics, moving beyond the traditional ransomware attacks on corporate and government networks. Previously, their focus involved encrypting files and demanding ransoms. However, a new and alarming trend has emerged, wherein criminals are now…
Google malware exploit allows hackers to access accounts without passwords
Accessing an online account typically requires a username and password, but cybersecurity researchers at CloudSEK have uncovered a disturbing trend where hackers can gain unauthorized entry into Google accounts without the need for a password. This illicit method exploits malware,…
Country takes help of Blackhat Hackers infiltrating government websites
When a company’s website falls victim to hacking, conventional practice dictates that its IT staff or business leaders seek the assistance of forensic experts in cybersecurity to navigate negotiations with hackers and mitigate the situation. However, the Philippines has taken…
A Guide to Guarding Against Ransomware Attacks in 2024
In the ever-evolving landscape of cybersecurity, the threat of ransomware looms large. As we step into 2024, the sophistication and frequency of ransomware attacks continue to rise, making it imperative for individuals and organizations to adopt proactive measures to defend…
AI Will Be Powerful, But No Panacea
[By Neal Humphrey, VP Market Strategy at Deepwatch] Anyone following the deployment of self-driving cars knows the technology is proving far from foolproof. In the most recent development, the New York Times found that employees at the General Motors-owned autonomous…
Data Breached firm blames customers for reusing passwords
23andMe, renowned for its DNA testing and analysis services, has issued a statement placing blame on its users for a data breach that occurred last year. The genomics company openly admitted that its users were not adequately securing their accounts…
FBI says Capitol Bomb Threat hackers are hard to identify
Over the recent days, the FBI and various law enforcement agencies have been inundated with emails claiming bomb threats targeting Capitol buildings throughout the United States. Authorities express their frustration in attempting to trace the culprits behind these threats, as…
What is the qualification to become a Cybersecurity Analyst
Becoming a cybersecurity analyst typically requires a combination of education, skills, and practical experience. Here’s a general guide to the qualifications needed for this role: 1. Educational Background: Bachelor’s Degree: Many employers prefer candidates with a bachelor’s degree in a…
SentinelOne acquires PingSafe
SentinelOne, a leading provider of AI-based enterprise security solutions, has recently revealed its plans to acquire PingSafe, a specialized application security firm, in an undisclosed cash and stock deal. The primary goal behind this strategic move is the seamless integration…
Over 1800 global banking apps targeted by 29 malware variants
In recent months, a staggering 29 malware families have been discovered targeting approximately 1800 banking applications worldwide. This revelation, based on a comprehensive survey conducted by security firm Zimperium, involved insights from over 2000 respondents spanning 61 countries. Outlined in…
Cyber Kidnapping picks pace in the United States
Attention to all Chinese-origin students currently participating in exchange programs in the United States: Be aware that there is a growing threat of ‘Cyber Kidnapping’ targeting individuals who are not vigilant. Hackers have been contacting parents in China, pressuring them…
The Top 6 Cybersecurity Threats Businesses Must Tackle in 2024
[By Andrew Hural, Director of Managed Detection and Response, UnderDefense] Through the rise of Artificial Intelligence (AI), increased cyberwarfare and new emerging technologies, the security landscape has evolved significantly, with new threats emerging and existing ones growing in sophistication. Cybersecurity…
How to Secure virtual machines (VMs) in cloud computing environments
Securing virtual machines (VMs) in cloud computing environments is crucial to ensure the confidentiality, integrity, and availability of your data and applications. Here are some general guidelines to help you secure VMs in the cloud: 1.Update and Patch Regularly: Keep…
Quantum computing will enable a safer, more secure world
[By Adam Goldfeld – Technology Team Lead at Classiq] Today’s media narrative around quantum computing’s role in cybersecurity is overwhelmingly negative, because quantum computers will render today’s encryption standards redundant, leaving much of our data at risk of being decoded.…
Tesla AI Robot Attacks raises concerns over Cybersecurity
Over the recent Christmas weekend, a thought-provoking discussion emerged among tech enthusiasts on Reddit, sparking concerns about the Tesla AI Robots designed for manufacturing. The conversation, initially initiated in November, gained momentum when an engineer was reportedly attacked by a…
So You Want to be a Leader in Cybersecurity? Follow this Path
Effective cybersecurity leadership is vital for organizations worldwide. It requires a combination of technical expertise, strategic vision and effective communication to create a security-conscious culture that withstands the challenges of today’s digital world. Cybersecurity leaders embed security across operations, rapidly…
Australia Victoria State Court System data breach by Russia
Recently, the court systems of Victoria State in Australia fell victim to a cyberattack, and suspicions point towards a Russian ransomware gang. The IT staff of the court systems reported a fraudulent infiltration on December 21, 2023, revealing that audio…
School student info proving valuable to hackers
Hackers have recently intensified their efforts to pilfer digital information pertaining to students, encompassing a wide array of sensitive data such as health records, attendance information, homework, grades, medical details, photos, disciplinary records, educational records, home communication information, assignments, and…
Crafting an Effective Cyber Attack Response Plan: A Comprehensive Guide
In an era dominated by digital advancements, businesses and organizations face an ever-growing threat from cyber attacks. The importance of having a robust cyber attack response plan cannot be overstated. A well-crafted plan not only helps mitigate potential damage but…
China arrests 4 people who developed ChatGPT based ransomware
Microsoft-owned ChatGPT, developed by OpenAI, remains officially inaccessible in China. However, an intriguing turn of events reveals that hackers within the country have managed to exploit the service through VPNs. These cyber criminals successfully deployed ransomware, encrypting servers within a…
Beware of this Instagram trend that compromise Data Privacy
In today’s modern era, the concept of privacy in our daily lives seems elusive, given the widespread sharing of personal details on various social media platforms. From Facebook and Instagram to WhatsApp, Twitter, and even the notorious Telegram, users often…
Navigating Cloud Security: A Comparative Analysis of IaaS, PaaS, and SaaS
In the era of digital transformation, businesses are increasingly leveraging cloud computing services to enhance agility, scalability, and efficiency. However, the paramount concern for organizations considering a move to the cloud is the security of their data and operations. This…
Trending Ransomware news headlines on Google
During the holiday season of Christmas 2023, a ransomware attack targeted the Ohio Lottery, causing disruptions to its operations. The gaming company is currently in the process of recovering its encrypted data and is consulting with security experts to expedite…
Vietnam hacked CCTV videos selling like hotcakes on Telegram
The Telegram messaging app has emerged as a hub for criminal activities, serving as a platform for data exchange among various illicit networks. Criminals, ranging from drug and child traffickers to cybercriminals, are increasingly utilizing Telegram to facilitate their nefarious…
Ransomware attack leads to identity theft of an Oakland Man
In recent times, we’ve been inundated with countless stories about ransomware attacks and the extortion demands posed by cyber-criminals. However, a new facet of cyber-crime has emerged, taking the form of a twist in the aftermath of a ransomware assault…
Unmasking Identity Theft: Detection and Mitigation Strategies
In an increasingly digital world, the threat of identity theft looms large, making it imperative for individuals to be proactive in detecting potential breaches and implementing effective mitigation measures. This article delves into key strategies for identifying identity theft and…
China stealing AI feed data from America for Spying
As per a report featured in the Wall Street Journal, there has been a notable surge in China’s illicit acquisition of extensive datasets designated for training Artificial Intelligence (AI) tools in the United States. The apparent objective behind this activity…
Ransomware threat rises in November 2023
The month of November 2023 witnessed a surge in ransomware victims, with criminal gangs taking advantage of the holiday season. The combination of a thin IT staff and the Christmas holidays created an opportune environment for companies to fall prey…
UK to allow facial recognition on 50m drivers
Britain is poised to conduct facial recognition checks on its 50 million drivers in the upcoming year, with the aim of leveraging this initiative to apprehend criminals based on images captured in the CCTV surveillance database. The Home Office and…
Ubisoft ransomware attack gets thwarted
Ubisoft, the France-based video game publisher, recently announced that its in-house threat monitoring software successfully thwarted a ransomware attack that occurred on December 20th of this year. Despite this security success, the company is actively investigating a potential data breach…
Safeguarding Your Data: Strategies to Protect Against Information Stealers
In today’s digital age, the security of personal and sensitive information is of utmost importance. Cyber Threats, such as information stealers, pose a significant risk to individuals and businesses alike. Information stealers are malicious software designed to surreptitiously gather and…
What do CISOs need to know about API security in 2024?
[By Andy Grolnick, CEO, Graylog] In the past couple of years, there has been explosive growth in API usage as API-related solutions have enabled seamless connectivity and interoperability between systems. From facilitating data exchange to cross-platform functionality, companies with an…
India BSNL data breach exposes 2.9 million user records to hackers
BSNL, or Bharat Sanchar Nigam Limited, a government-funded telecommunications service provider operating nationwide in India, has recently fallen victim to a cyber attack resulting in the exposure of records belonging to more than 2.9 million users. The alleged perpetrator, a…
Most scammed items for this Christmas season
As the festive season is just a couple of days ahead, the joy of giving and receiving is accompanied by an unfortunate increase in scams targeting unsuspecting holiday shoppers. Scammers are adept at exploiting the spirit of generosity and the…
First American becomes victim to a ransomware attack
The initial American entity providing title and other insurance services recently experienced a cyber attack believed to be a variant of ransomware. While the insurance company acknowledged service disruptions on its website, it refrained from explicitly stating that the incident…
Cybersecurity for Remote Work: Securing Virtual Environments and Endpoints
[By Greg Hatcher, Founder & CEO — White Knight Labs] Remote work surged in popularity out of necessity during the COVID-19 pandemic but seems to be here to stay, thanks to its unique advantages. One study by Upwork estimates that…
5 Ways to Conquer Your Certification Exam Fears
“I’ve missed more than 9,000 shots in my career. I’ve lost almost 300 games. Twenty-six times, I’ve been trusted to take the game-winning shot and missed. I’ve failed over and over and over again in my life. And that is…
The Cyber Threat Intelligence Paradox – Why too much data can be detrimental and what to do about it
[By Gabi Reish, Chief Business Development and Product Officer, Cybersixgill] In today’s rapidly expanding digital landscape, cybersecurity teams face ever-growing, increasingly sophisticated threats and vulnerabilities. They valiantly try to fight back with advanced threat intelligence, detection, and prevention tools. But…
Malware threat on rise and some details
Hackers are currently exploiting an old vulnerability in Microsoft Excel to inject a newly identified malware known as ‘Agent Tesla.’ This malicious software is capable of either cleaning up a database or discreetly gathering intelligence, depending on the commands it…
How companies should recover when password breach occurs
Undoubtedly, every business worldwide is susceptible to cyber attacks and data breaches. The imperative response lies in implementing proactive measures to safeguard against such attacks and establishing an efficient disaster recovery plan for unforeseen events. Addressing password breaches, hackers frequently…
To Xfinity’s Breach and Beyond – The Fallout from “CitrixBleed”
On December 18, 2023, Comcast Xfinity filed a notice to the Attorney General of Maine disclosing an exploited vulnerability in one of Xfinity’s software providers, Citrix, that has jeopardized almost 36 million customers’ sensitive information. While the vulnerability was made…
Ransomware Attacks: Are You Self-Sabotaging?
[By Andy Hill, Executive Vice President, Nexsan] No IT professional is unaware of the staggering risk of ransomware. In 2023, recovering from a ransomware attack cost on average $1.82 million—not including paying any ransom—and some organizations get hit more than…
Cybersecurity Tips to Stay Safe this Holiday Season
[By Craig Debban, CISO of QuSecure] Have you ever been on a trip and realized that you forgot to pack something important? It’s easy to overlook things during the hustle and bustle of traveling, especially during the holidays. Unfortunately, cybercriminals…
New to Cybersecurity? Use These Career Hacks to Get a Foot in the Door
The need for cybersecurity professionals has been building for years, and nearly exponentially since COVID came on the scene. At this point, it’s painfully evident there’s a wide talent gap in the field, and research proves it — the global…
7 Cybersecurity Tips for Small Businesses
Keeping customer, employee, and company information secure can mean the difference between staying in business and going under. That’s why the importance of cybersecurity can’t be understated. But exactly how do you keep your systems secure? Here are seven tips…
Top 5 Lucrative Careers in Artificial Intelligence
For individuals possessing a professional engineering degree and harboring a passion for artificial intelligence, the most promising career paths of the future await your exploration. This article outlines the top 5 highest-paying careers in the field of Artificial Intelligence to…
Ransomware news on FBI, BlackCat, and Game plan release
It’s widely known that the Ryhsida Ransomware gang successfully infiltrated the servers of Insomniac, a company specializing in X-Men game development, including the Wolverine series co-developed with Sony Inc. The gang stole crucial data files, totaling 1.67 terabytes, and is…
How to retrieve data from google account if user dies
Certainly, dealing with digital assets and accounts after someone passes away can be a complex and sensitive matter. When it comes to retrieving data from a deceased user’s Google account, the process involves several steps and considerations. Google has a…
Microsoft ChatGPT faces cyber threat for being politically biased
Microsoft-owned ChatGPT, developed by OpenAI, is currently facing a cybersecurity threat from a group of individuals who identify themselves as Palestinians. They have declared their intention to carry out various cyber-attacks on the AI-based conversational bot. The group demands that…
Cyber Attack news headlines trending on Google
The festive season of Christmas 2023 has unfortunately become a prime time for cyber-criminals to unleash a wave of cyber attacks, with incidents occurring globally every two hours. In a recent development, Iran’s petrol stations found themselves under siege from…
How to protect kids on Google Android devices from Cyber Threats
Children worldwide are increasingly drawn to mobile phones and tablets, largely due to captivating games and applications that not only engage them but also provide a sense of meaning from their unique perspectives. While it’s a reality that we can’t…
Top 7 seven Cyber Attack news headlines trending on Google
MongoDB Inc., a platform specializing in document-oriented storage, has officially disclosed falling victim to a cyber attack on December 13, 2023. This breach potentially allowed hackers to gain unauthorized access to information stored in the MongoDB Corporate database servers. The…
The Intersection of AI and Cybersecurity: Unveiling Threats to Elections
In an era dominated by technological advancements, the integration of Artificial Intelligence (AI) into various aspects of our lives has brought unprecedented convenience and efficiency. However, as we witness the growing reliance on AI, particularly in the realm of elections,…
VPN Risk Report
Overview Traditionally, Virtual Private Networks (VPNs) have facilitated basic remote access. The rapid growth in the distributed workforce and increasing adoption of cloud technologies are challenging the basic connectivity that VPN offers. As the threat landscape rapidly evolves, VPNs cannot…
Network Security Priorities For Containers, According To Today’s IT Pros
[By Ratan Tipirneni, President and CEO, Tigera] Cloud computing and the use of cloud-native architectures enable unmatched performance, flexibility, velocity, and innovation. But as enterprises and small businesses increasingly use containers and distributed applications, threat actors are becoming increasingly sophisticated.…
Here’s How to Make Your Gaming Experience Safer
Over 1 billion people worldwide regularly play online games. Unfortunately, the emergence of high-quality games, multiple gaming mediums, and online communities has prompted gamers to overlook the dark side of online gaming. So, if you play games online on your…
Shining a Light on Modern Cyber Battlefield Attacks
[By Oren Dvoskin, Director of Product Marketing at Morphisec] The global cybersecurity market continues to soar, and for good reason, cybercriminals are becoming increasingly sophisticated and effective. In fact, it’s safe to say that the sophistication of today’s criminals is far outpacing the evolution of…
Top 10 CISSP Stress-Busting Study Tips & Tricks
We all know that nervous feeling we get when we’re about to take a test. It’s normal to feel some anxiety. And a little stress can actually help you focus and do better. But don’t let it stop you from…
Sensitive data loss is due to lack of encryption
In an era where data is the lifeblood of businesses, safeguarding sensitive information has become paramount. Cybersecurity lapses have historically been a cause of data breaches, but a recent study sheds light on a new dimension of vulnerability – the…
Microsoft AI ChatGPT going rogue or experiencing seasonal depression
It’s common knowledge that Microsoft now owns ChatGPT, the conversational chatbot developed by OpenAI. However, readers of Cybersecurity Insiders are now encountering an unexpected twist in the narrative – ChatGPT seems to be refusing commands from humans or responding with…
Essential Tips for Claiming Cyber Insurance Coverage
In an era dominated by digital transactions and interconnected networks, the importance of cyber insurance cannot be overstated. Cybersecurity threats loom large, making it crucial for businesses to not only invest in robust preventive measures but also secure a comprehensive…
China to lock down GPS data for security concerns
In contemporary times, it has become commonplace for applications to request user permission to access their geographical location. Some apps seek access only during use, while others request continuous access. China has recently taken a stringent approach towards applications seeking…
Apple iPhone to offer new security mode in its new iOS 17 update
Apple Inc. is poised to introduce a groundbreaking feature across all its iPhone models aimed at safeguarding users against potential threats of private passcode theft. The technology giant identified the rising concern of passcode theft approximately nine months ago when…
Catastrophic Ransomware cyber threat looming on UK
The United Kingdom government is teetering on the brink of a potential catastrophic ransomware attack, according to the Joint Committee on the National Security Strategy (JCNSS). Interestingly, the JCNSS’s report suggests that Home Secretary Suella Braverman has shown minimal interest…
Ensuring a Secure Future: Global Guidelines for AI Security
Artificial Intelligence (AI) is rapidly transforming industries and societies, offering unprecedented opportunities and efficiencies. However, with the increasing integration of AI into various facets of our lives, concerns about security and ethical considerations have come to the forefront. Establishing global…
Rhysida Ransomware targets Sony Insomniac
Sony has initiated an inquiry into a security breach affecting its game developer division, ‘Insomniac Games.’ The investigation has confirmed that the incident resulted in the unauthorized access and leakage of employee information, as well as details related to upcoming…
Cyber Attack on Ukraine Kyivstar while China disrupts the Critical Infrastructure of the United States
China has recently initiated a series of cyber attacks targeting critical infrastructure in the United States, causing disruptions in power utilities, ports, transportation systems, communication networks, and water facilities. The White House has launched a comprehensive investigation into these cyber…
Watch out for these signs when your smart phone is hacked
Smartphones have become indispensable in our daily lives, but with their ubiquity comes the lurking threat of hackers seeking to infiltrate these devices and gain access to our personal information. This danger is particularly heightened for individuals in the public…
When Looking For Cybersecurity Solutions, Don’t Shrug Off Startups
[By Brian McMahon, CEO and President of Threater] Let’s say you’re looking for some new technology for your business. How do you decide which company you’re going with? If you’re like many people, you head straight to the Google search…
Future-Proofing Cybersecurity: A Deep Dive into WithSecure’s Innovative Mid-Market Security Solutions
WithSecure, previously F-Secure for Business, has established itself as a leader in the cybersecurity sector since its inception in 1988. With a global footprint spanning Europe, North America, and Asia Pacific, the company has shown robust growth, especially in its…
The Shift in Power from CIO to CISO: The Rise in Cyber Attacks Enables Greater Resources and Budget Allocation
[By Jaye Tillson, Field CTO at Axis Security] In today’s technology-driven world, cyber-attacks have become an ever-increasing threat to organizations across all industries. If that’s not bad enough. these threats are becoming more sophisticated while continuing to escalate in number.…
The Biggest SAP Cybersecurity Mistake Businesses Make—And How To Prevent It
[By Christoph Nagy, SecurityBridge] In the high-stakes world of cybersecurity, even a tiny miscue can lead to giant consequences. Human error, whether it be something as small as a misplaced password or a misconfigured Amazon S3 Bucket, can compromise the…
Top 8 Cyber Attack news headlines trending on Google
1.) The ALPHV ransomware gang’s website, which provides information leaks and negotiation details, has been inaccessible for several hours. Telegram sources suggest that law enforcement linked to Euro-pol may have taken down the blog, which is only accessible through TOR.…
A Comprehensive Cybersecurity Audit Checklist: Ensuring Digital Resilience
In an era dominated by digital advancements, the importance of cybersecurity cannot be overstated. Cybersecurity audits play a pivotal role in fortifying an organization’s defenses against evolving cyber threats. Whether you’re a business owner, IT professional, or security enthusiast, conducting…
Reflectiz Introduces AI-powered Insights on top of Its Smart Alerting System
Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new AI-powered capability enhancing its Smart Alerting system. The new AI-powered insights enhances the Reflectiz Smart Alerting system by integrating AI LLM technology on top of its…
2023 Cloud Security Report
In 2023, the cloud is fundamentally delivering on its promised business outcomes, including flexible capacity and scalability, increased agility, improved availability, and accelerated deployment and provisioning. However, security concerns remain a critical barrier to cloud adoption, showing little signs of…
Microsoft to offer glass based storage tech that is ransomware proof
Microsoft is actively engaged in the development of a glass-based data storage medium slated for integration into its data centers that facilitate Azure Cloud services. This innovative ceramics-based storage solution is specifically designed for archival purposes and is touted to…
Twitter fired its Information Security head for cutting budget on data security and privacy
Elon Musk has been making headlines recently, not only for his contentious remarks against his company’s investors but also for the abrupt dismissal of his Information Security head. The focus of the controversy lies in allegations made by Alan Rosa,…
Guidelines for Secure AI System Development
In an era where artificial intelligence (AI) plays an increasingly pivotal role across various industries, ensuring the security of AI systems has become a paramount concern. As AI technology continues to advance, developers and organizations must prioritize robust security measures…
Star Blizzard Cyber Attacks on UK
Star Blizzard, a hacking group allegedly sponsored by Russia’s intelligence agency Centre 18, has recently made headlines for engaging in long-term espionage on prominent figures in the United Kingdom, including top politicians, journalists, and bureaucrats. The discovery of this covert…
Getting Ahead of the Attack
[By Matt Wilson, vice president of product management, Netography] Being proactive is always good advice, but being proactive and being prepared when it comes to cybersecurity is a must. With threat actors maturing and constantly changing their methods, security teams…
Log4Shell: A Persistent Threat to Cybersecurity – Two Years On
[By Mike Walters, President and co-founder of Action1] Two years have passed since the cybersecurity world was rocked by the discovery of Log4Shell, a critical vulnerability in the Log4j library. First discovered on December 9, 2021, this legendary flaw exposed…
Star Blizzard launched Cyber Attacks on UK since years
Star Blizzard, a hacking group allegedly sponsored by Russia’s intelligence agency Centre 18, has recently made headlines for engaging in long-term espionage on prominent figures in the United Kingdom, including top politicians, journalists, and bureaucrats. The discovery of this covert…
Why Infostealers are Stealing the Security Spotlight
The cybersecurity landscape is constantly evolving, with bad actors finding new and creative ways to exploit weaknesses. The threat from Malware continues to escalate with infostealers, an increasingly popular variant. Research found that 24% of malware is now infostealers, and…
Sierra Wireless routers are vulnerable to Cyber Attacks
Sierra Wireless, a Canadian company specializing in industrial web connectivity solutions, has recently come under scrutiny due to security concerns. Security experts have identified approximately 21 vulnerabilities in the software of its routers, such as OpenDNS and TinyXML. These vulnerabilities…
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program
[By Perry Carpenter, chief evangelist and security officer at KnowBe4] The threat landscape is evolving with new attack vectors and cyber threats surfacing almost daily. Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that…
Cyber Threat emerges out of Apple iOS 17 new NameDrop Feature
Apple’s recent update to iOS 17 introduced a new feature called NameDrop, enhancing data transfer capabilities for iPhone and Apple Watch users. This update allows seamless sharing of various files, including contacts, messages, photos, and videos. Despite its convenience, security…
Cyber and Physical Security Are Different, But They Must Work Together
[By Blake Benson, Senior Director – Industrial Cybersecurity Practice at ABS Group] America’s critical infrastructure faces more diverse threats than ever before. The rapid digitalization of many sectors and the relatively analog operational environments that exist in others have led…
UK to block all Social Media Scams
Starting May 2024, residents of the United Kingdom can breathe a sigh of relief, as social media platforms operating in the country have collectively committed to combating a range of scams on their respective networks. This includes everything from phishing…
Securing the Cloud: Strategies for CSPs to Mitigate Malware Hosting Risks
In recent years, the prevalence of cloud computing has revolutionized the way businesses operate, offering scalability, flexibility, and cost-efficiency. However, this technological shift has also attracted the attention of cyber-criminals who exploit cloud environments for hosting malware. Cloud Service Providers…
Nine 9 tips before putting your Android Smartphone or Apple iPhone for resale
Many Americans are likely considering selling their old smartphones to upgrade to the latest models released by OEMs, featuring innovative features and new operating systems. However, before selling your smartphone to a friend or a company, it’s crucial to take…