Category: Cybersecurity Insiders

Cloud Security becoming a priority for businesses in 2024

With the rise of digital transformation and widespread adoption of cloud-based solutions, organizations are increasingly turning to these platforms to meet their evolving needs. However, the surge in data breaches within cloud data centers has sparked significant concern among security…

How to safeguard oneself from sectortion attacks online

Safeguarding oneself from sectortion attacks online is crucial in today’s digital age where cyber threats continue to evolve. Se*tortion, a form of blackmail where perpetrators threaten to release intimate images or videos unless demands are met, can have devastating consequences…

CDK Global faced second ransomware attack

CDK Global, a prominent provider of software solutions for automotive sales and services across 15,000 dealerships, recently faced significant disruptions due to alleged ransomware attacks. Reports indicate that the attacks, attributed to the Black Suit file encrypting malware group, initially…

Ransomware attacks on obsolete Android devices

Attention Android users still on versions 11 or earlier: A critical security update demands your immediate attention. Multiple hacking groups are targeting outdated Android devices with open-source mobile ransomware variants, prompting urgent warnings from cybersecurity experts. Recently, Check Point issued…

Create order from chaos

The task of managing and interpreting vast amounts of data is akin to finding a needle in a haystack. Cyber threats are growing in complexity and frequency, demanding sophisticated solutions that not only detect but also prevent malicious activities effectively.…

NHS Qilin Ransomware gang is shrugging off the blame

The Qilin ransomware group, responsible for the recent attack on NHS, resulting in the cancellation of nearly 1200 operations and crucial blood tests, has urged against blaming them for the hardships faced by Britain’s healthcare system. Instead, they pointed fingers…

Top 10 Industries Most Vulnerable to Cyber Attacks

Cybersecurity threats continue to pose significant challenges across various industries, with certain sectors bearing the brunt of frequent and severe cyber attacks. Here’s a closer look at the top 10 industries most vulnerable to cyber attacks: 1. Healthcare: The healthcare…

AI in Cybersecurity: Friend or Foe?

How organizations can both leverage and defend against artificial intelligence (AI) in security operations.  While AI has been around for many years and isn’t a new concept, the emergence of generative AI (GenAI) boosted by large language models (LLMs) has…

Defending Against Business Email Compromise: A Comprehensive Guide

In today’s digital age, where email communication is integral to business operations, the threat of Business Email Compromise (BEC) looms large. BEC attacks are sophisticated schemes where cybercriminals manipulate email communication to deceive employees into transferring money or sensitive information.…

Kaspersky banned in the United States

Normal 0 false false false EN-US /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-pagination:widow-orphan; mso-hyphenate:none; font-size:10.0pt; mso-bidi-font-size:11.0pt; font-family:”Calibri”,sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:Calibri; mso-bidi-theme-font:minor-bidi; mso-font-kerning:1.0pt; mso-ligatures:standardcontextual;} The United States government…

Now a Doctrine for Cyberspace Operations

Have you ever heard of a Doctrine meant to formulate cyber space operations? Well, here’s a news piece that might interest you a bit. The Indian Armed Forces have recently adopted a groundbreaking Doctrine specifically aimed at conducting operations in…

Four Steps to Improving Your Organization’s Cyber Resilience

The question is not ‘if’ your organization will face a cybersecurity threat but ‘when.’ The bad news gets worse: suffering one attack does not immunize you against future breaches. Therefore, your approach to improving your organization’s cybersecurity resilience should not…

Update on ransomware attacks on NHS, AMD and CDK Global

1.) Recently, the Qilin ransomware group, believed to originate from Russia, targeted three hospitals and a network, severely disrupting emergency services for patients. The attack, which occurred on June 4, 2024, via Synnovis Software, has led the gang to demand…

Cyborg Social Engineering: Defending against personalised attacks

Generative AI has the potential to make social engineering attacks much more sophisticated and personalised. The technology can rapidly mine sites for information on a company, individuals, their responsibilities and specific habits to create multi-level campaigns. Through automated gethering of…