The Cybersecurity and Infrastructure Security Agency (CISA), a key agency responsible for protecting the United States’ critical infrastructure, has taken a significant step by instructing its threat hunting team to cease using VirusTotal—a widely used cybersecurity tool—by April 20, 2025.…
Category: Cybersecurity Insiders
Cyber insurance providers: Friends not foes
The relationship between an insurance provider and the insured is often described as adversarial: one party reluctantly pays a premium, while the other is reluctant to pay out if possible. But cyber insurance doesn’t have to be this way. The…
Below the Surface: The Iceberg of Known Vulnerabilities
Have you ever heard the saying, “Better the devil you know than the devil you don’t”? In short, it’s better to take a risk with something or someone you understand. In cybersecurity, that’s not really the case. The devils we…
Cybersecurity Blogs: What You Should Know in 2025
There are many blogs about cybersecurity. Some blogs are for people who are not experts. They help you learn how to stay safe online. Other blogs are for professionals who work in cybersecurity. These blogs talk about deep topics like…
Data quality and AI: Why innovation can’t outrun governance
AI is no longer the technology of tomorrow; it’s today’s most pressing business opportunity. According to recent findings from Semarchy, an overwhelming 75% of organisations plan to invest in AI technologies in 2025 alone. This surge in interest reflects AI’s…
How Cybercriminals Are Exploiting Technology to Scam Taxpayers
In an era where artificial intelligence (AI) is revolutionizing industries across the board, cybercriminals are not far behind in leveraging this powerful technology for nefarious purposes. The landscape of tax fraud and Internal Revenue Service (IRS) scams is undergoing a…
Good Non-Human Identity Governance Means Maturing Your Enterprise Secrets Management
Learn why enterprise secrets management is a key component to building a robust non-human identity governance model and is required for securing the whole organization. When you think of identity and access management (IAM), you traditionally think of humans. We’ve…
Saudi Cyber Innovation: Redefining SOC Operations
Launch of COGNNA at RSA 2025 Security teams today face an unstoppable challenge—one that isn’t just about technology but about operational endurance. For years, SOC analysts have been inundated with alerts, struggling with fragmented tools and siloed systems that require…
Fog Ransomware Gang Now Demands $1 Trillion: A Curious Twist Tied to DOGE and Elon Musk
The Fog Ransomware gang, which has been making headlines over the past week due to its increasingly audacious demands, is now requesting a staggering $1 trillion from its victims. However, this isn’t a straightforward ransom demand like we typically see…
Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE
Tel Aviv, Israel, 23rd April 2025, CyberNewsWire The post Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE first appeared on Cybersecurity Insiders. The post Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE…
Mark & Spencer hit by Cyber Attack on Easter
On April 21, 2025, British retail giant Mark and Spencer (M&S) confirmed that it was the victim of a cyberattack that disrupted its contactless payment terminals in over 1,400 of its UK stores. The company reassured customers that both its…
Essentials to Gain 100% Cybersecurity Success: A Comprehensive Approach
In this increasingly digital world, cybersecurity has become more than just an IT concern; it’s a critical aspect of every business’s strategy and operations. With the rise of cyber threats—ranging from ransomware and phishing to insider threats and advanced persistent…
New cryptocurrency creation will lead to more ransomware attacks
In the past two to three years, law enforcement agencies around the world have made significant strides in combating ransomware attacks. These malicious attacks, often involving file-encrypting malware, have wreaked havoc on individuals, businesses, and even entire governments. However, authorities…
Akira Ransomware shifts focus to SMBs
Many small and medium-sized businesses (SMBs) operate under the assumption that cybercriminals won’t target them, believing their data or systems lack the value to entice hackers. After all, these businesses often can’t afford the hefty ransoms that typically interest cyber…
Emerging cyber threats from Genetic Data
In today’s digital age, cyberattacks are becoming increasingly sophisticated, with hackers targeting not only financial information or personal identities but also more intimate and sensitive data—genetic data. While we have long been aware of the risks to personal information like…
Ransomware Attacks on Financial Institutions: A Rising Threat with Multi-Layered Consequences
In 2024, financial institutions around the globe suffered an average loss of $6.08 million due to ransomware attacks. This marked a 10% increase compared to the previous year, signaling a disturbing trend of rising cybercrime targeting the financial sector. The…
How the China-US Trade Tariff War Is Increasing Cybersecurity Concerns
The ongoing trade dispute between China and the United States, commonly referred to as the “tariff war,” has created far-reaching effects beyond economics and politics. One of the often overlooked consequences of this prolonged conflict is its growing impact on…
Chinese smartphones now stealing cryptocurrency from wallets
The next time you’re looking for a budget-friendly smartphone, particularly one from a Chinese brand, you might want to proceed with caution. A recent warning from cybersecurity experts at Dr. Web, an anti-virus software company, suggests that purchasing low-cost smartphones…
Great Companies Don’t Just Build Apps, They Engineer Experiences
What is the most valuable asset a company has? It’s not just its intellectual property, brand recognition, or even its technology – it is its customers. And in today’s digital-first world, how do companies connect with their customers? Through mobile…
EU to provide burner phones to staff to banish Security concerns
As part of growing concerns over mobile security and potential espionage, the European Union has issued a cautionary advisory to its members and staff attending the upcoming International Monetary Fund (IMF) and World Bank events in the United States next…