San Juan, Puerto Rico, April 25th, 2024, CyberNewsWire The telecom company AeroNet Wireless announced the launch of its new 10Gbps speed Internet plan, marking an important landmark for the telecommunications sector in Puerto Rico. “We have invested millions to expand…
Category: Cybersecurity Insiders
How Security Service Edge is Revolutionizing Network Security
Learn how Security Service Edge (SSE) is transforming network security and protecting your organization from cyber threats. Discover the benefits of SSE and learn more about how SSE is revolutionizing network security Security Service Edge is a novel concept in…
Thinking about a Career in Security Operations? Follow this Path
Security operations professionals are the first to sound the alarm on intrusion attempts by bad actors. Organizations rely on them for security monitoring, security incident management, vulnerability management, security device management and network flow monitoring. Are you ready for a…
LockBit using botnets to send 9 million emails
The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) recently issued a warning regarding the LockBit ransomware group’s latest tactics. Dubbed the LockBit Black Ransomware Campaign, this operation utilizes the Phorpiex Botnet to orchestrate a large-scale phishing email onslaught. According…
Australia Firstmac hit by ransomware and info on Europol Data Breach
Australian financial institution Firstmac recently fell victim to a cyber attack, suspected to be a ransomware variant. The Brisbane-based mortgage firm was targeted by the Embargo ransomware group, which encrypted its servers on April 30th, 2024, and exfiltrated approximately 500GB…
Demystifying Infrastructure as Code (IaC) Scanning: Enhancing Security in DevOps
In today’s fast-paced technological landscape, the adoption of Infrastructure as Code (IaC) has revolutionized the way organizations manage and deploy their IT infrastructure. IaC allows teams to define and provision infrastructure through code, enabling automation, scalability, and consistency. However, with…
BlackBasta Ransomware targeted nearly 500 firms till May 2024
The BlackBasta Ransomware gang has been causing havoc across a spectrum of organizations, targeting nearly 500 entities from April 2022 to May 2024, as per a report jointly released by the Department of Health and Human Services (HHS) and the…
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware
Password stealing malware is again rising with several attacks making the news cycle in recent months. For instance, a new password-stealing malware named Ov3r_Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis into password-stealing…
Dell admits data breach of over 49 million customers via Cyber Attack
Dell, a leading technology services provider, has publicly announced that it is actively investigating allegations raised by a threat actor known as Menelik, who purportedly attempted to sell information concerning its 49 million customers on a breach forum. The individual…
Adaptive Shield Launches SaaS Security for AI at RSA Conference 2024 to Mitigate GenAI Revolution Risks
New capabilities help security teams secure the SaaS AI ecosystem amid increasing adoption of AI tools, functionalities RSA Conference–Adaptive Shield, the leader in SaaS Security, today announced breakthrough SaaS Security Posture Management (SSPM) detection and response capabilities for AI-driven applications…
The Top 7 IAM Tools in 2024
Identity and access management (IAM) tools are important for protecting network infrastructure by setting parameters for who can access it and when. If you’re looking for the best identity and access management tools to use this year, here are some…
Defending Against Hackers in the Public Sector Is a Different Beast
The general perception of hackers is that they’re Mr. Robot-esque renegades who utilize futuristic technologies in order to single-handedly take down monolithic foes, like multinational corporations or entire governments. The reality is more mundane. Most malicious actors choose the path…
PRODUCT REVIEW: SYXSENSE ENTERPRISE
Today’s digital transformation is rapidly changing the IT and cybersecurity landscape: Remote work and the increased shift to the cloud has broadened the attack surface, introducing new vulnerabilities as employees connect from everywhere. This situation is compounded by the rise…
Best Practices for Companies in protection of User Data
In today’s digital age, where data breaches and cyber threats are rampant, safeguarding user data has become paramount for companies across industries. With increasing concerns about privacy and data security, businesses must prioritize robust measures to protect the sensitive information…
Britain NCSC faces Password Embarrassment
The inception of the National Cyber Security Centre (NCSC) of the United Kingdom in 2016 marked a pivotal step in issuing alerts concerning cyber attacks and hacking incidents. Tasked as the cyber arm of GCHQ (Government Communications Headquarters), its primary…
5 Reasons Structured Cabling Networks are Critical for IT Security Management
A robust IT infrastructure is non-negotiable in today’s digital age. Central to this infrastructure is structured cabling, the unsung hero ensuring that data flows securely and efficiently across networks. As cyber threats grow more sophisticated, the strategic importance of structured…
Combatting foreign interference
The spectre of foreign interference, ranging from corporate espionage to intellectual property theft, poses significant threats to organisations striving for competitive edge. Against this backdrop, the release of the 2024 Insider Risk Investigations Report by the DTEX i3 team underscores…
Ascension suffers Cyber Attack
Ascension, a provider of services related to hospital care and senior living facilities, has released an official statement acknowledging a cyber-attack on its IT network. The exact nature of the incident has yet to be disclosed, but unofficial reports suggest…
Navigating the Future: Zero Trust and SSE in Cybersecurity Leadership Strategies
The cybersecurity landscape is undergoing a rapid and alarming transformation. The once impregnable castle-and-moat defenses are proving inadequate in this new hybrid world. This article delves into two potent concepts shaping the future of information security: Zero Trust and Security…
How Data Fabric Architecture Helps Enhance Security Governance
Because of the growing complexities of enterprise IT infrastructure, the concept of “data fabric” has been attracting attention in recent years. As organizations expand and work with more information from growing numbers of sources, they need more efficient ways to…