Category: Cybersecurity Insiders

Cyber insurance providers: Friends not foes

The relationship between an insurance provider and the insured is often described as adversarial: one party reluctantly pays a premium, while the other is reluctant to pay out if possible. But cyber insurance doesn’t have to be this way. The…

Cybersecurity Blogs: What You Should Know in 2025

There are many blogs about cybersecurity. Some blogs are for people who are not experts. They help you learn how to stay safe online. Other blogs are for professionals who work in cybersecurity. These blogs talk about deep topics like…

Saudi Cyber Innovation: Redefining SOC Operations

Launch of COGNNA at RSA 2025 Security teams today face an unstoppable challenge—one that isn’t just about technology but about operational endurance. For years, SOC analysts have been inundated with alerts, struggling with fragmented tools and siloed systems that require…

Mark & Spencer hit by Cyber Attack on Easter

On April 21, 2025, British retail giant Mark and Spencer (M&S) confirmed that it was the victim of a cyberattack that disrupted its contactless payment terminals in over 1,400 of its UK stores. The company reassured customers that both its…

New cryptocurrency creation will lead to more ransomware attacks

In the past two to three years, law enforcement agencies around the world have made significant strides in combating ransomware attacks. These malicious attacks, often involving file-encrypting malware, have wreaked havoc on individuals, businesses, and even entire governments.  However, authorities…

Akira Ransomware shifts focus to SMBs

Many small and medium-sized businesses (SMBs) operate under the assumption that cybercriminals won’t target them, believing their data or systems lack the value to entice hackers. After all, these businesses often can’t afford the hefty ransoms that typically interest cyber…

Emerging cyber threats from Genetic Data

In today’s digital age, cyberattacks are becoming increasingly sophisticated, with hackers targeting not only financial information or personal identities but also more intimate and sensitive data—genetic data. While we have long been aware of the risks to personal information like…

Chinese smartphones now stealing cryptocurrency from wallets

The next time you’re looking for a budget-friendly smartphone, particularly one from a Chinese brand, you might want to proceed with caution. A recent warning from cybersecurity experts at Dr. Web, an anti-virus software company, suggests that purchasing low-cost smartphones…