In recent times, our attention has been drawn to ransomware attacks targeting both public and private entities. However, a new concern has emerged: ransomware testing. According to a report from cybersecurity firm ‘Performanta’, hackers are conducting ransomware tests in developing…
Category: Cybersecurity Insiders
Understanding and Responding to Distributed Denial-of-Service Attacks
Sometimes the best advice is free advice. Especially in cybersecurity, where understanding the ‘why’ behind attacks can be as crucial as defending against them. Recently, CISA, the FBI, and MS-ISAC have highlighted Distributed Denial-of-Service (DDoS) attacks, not just as random…
Overcoming security alert fatigue
Alert fatigue represents more than a mere inconvenience for Security Operations Centre (SOC) teams; it poses a tangible threat to enterprise security. When analysts confront a deluge of thousands of alerts daily, each necessitating triage, investigation, and correlation, valuable time…
Change healthcare faces data leak threat despite paying $22 million as ransom
Change Healthcare, a subsidiary of UnitedHealth Group, has confirmed the transfer of 350 bitcoins, equivalent to $22 million USD, to a crypto wallet owned by the ALPHV Ransomware group. Despite complying with the ransom demand, concerns linger for the victim…
Strategies for Building Resilient Cloud Security in Small and Medium Enterprises (SMEs)
In today’s digital landscape, small and medium enterprises (SMEs) are increasingly turning to cloud computing to streamline operations, enhance scalability, and reduce costs. However, with the benefits of cloud adoption come significant security challenges. Protecting sensitive data and ensuring compliance…
Four ways to make yourself a harder target for cybercriminals
All of us rely on at least one device in order to go about our daily lives. Our smartphones help us get from A to B, connect us with friends and manage our bank accounts, our work laptops allow us…
Veeam acquires Coveware to boost its ransomware protection
Veeam, a leading provider of backup solutions, has announced its acquisition of Coveware, a cyber incident response firm, in a move aimed at enhancing its ransomware protection technology. The terms of the acquisition remain undisclosed. Coveware specializes in forensic investigation,…
Russian cyber forces cyber attack water tower just to make it overflow
A group known as the Cyber Army of Russia Reborn (CARR) has issued a stark warning, asserting its capability to breach United States water facilities and unleash chaos. This ominous declaration was accompanied by details shared on Telegram, showcasing their…
More companies refuse to pay ransom in 2024
In 2024, a significant shift in corporate response to ransomware attacks has emerged, reflecting a resolute stance against capitulation to hackers’ demands for ransom payments. Coveware, a notable cybersecurity firm, has underscored this trend, revealing that merely 28% of affected…
EASA Alerts Airlines Amid Suspected Cyber-Attacks on UK-Bound Flights
European Union Aviation Safety Agency (EASA) has issued a cautionary alert following reports of cyber-attacks targeting flights bound for the United Kingdom. These incidents have raised serious concerns regarding the safety and security of air travel, prompting EASA to advise…
Safeguarding Your Gmail Account: Strategies to Defend Against Fraud
In today’s digital age, email has become an indispensable tool for communication, both personal and professional. Among the most widely used email services is Gmail, provided by Google. However, with the convenience of email also comes the risk of fraud…
Defining and Understanding Trust Assurance
Trust is perhaps the most foundational principle that shapes how businesses operate. It’s important to customers, partners, employees, and just about any stakeholder you can think of. The process of building, earning, and keeping trust for an organization is quite…
PRODUCT REVIEW: Safous Zero Trust Access
The Safous Zero Trust Access (ZTA) solution emerges as a comprehensive cybersecurity platform, designed to tackle the growing challenges enterprises face in protecting digital assets in an increasingly interconnected and dynamic world. With the rise of remote work, BYOD policies,…
SAFOUS ZERO TRUST ACCESS – Comprehensive Cybersecurity for the Modern Enterprise
The Safous Zero Trust Access (ZTA) solution emerges as a comprehensive cybersecurity platform, designed to tackle the growing challenges enterprises face in protecting digital assets in an increasingly interconnected and dynamic world. With the rise of remote work, BYOD policies,…
FBI says Akira Ransomware group raked $42 million
The FBI, in collaboration with CISA, Europol European Cybercrime Centre, and the Netherlands NCSC, has issued a stark warning regarding the Akira Ransomware gang, which has amassed a staggering $42 million from approximately 230 companies as of January 24th, 2024.…
Possible Cyber Attack on 911 of 4 American States
The 911 emergency services experienced a significant outage in four states—Nebraska, South Dakota, Texas, and Nevada—sending shockwaves through the affected communities. Speculation points to a cyber attack orchestrated by Chinese intelligence, targeting all 50 states. However, only nine states were…
Can Ransomware Gangs Be Neutralized? Exploring Strategies to Combat Cyber Extortion
In recent years, ransomware attacks have emerged as one of the most pervasive and damaging cyber threats, with criminal gangs employing sophisticated tactics to extort money from individuals, businesses, and even government entities. As the frequency and severity of these…
Data privacy and security become most worrisome for AI adoption decision makers
Decision makers keen on integrating AI tools into their operations are expressing concern over data privacy and security. This sentiment extends to their cautious approach towards embracing generative AI, as revealed by a study conducted by Coleman Parkes Research, sponsored…
Microsoft and Google are top brands misused to scam users
Online users are increasingly becoming targets of phishing attacks, with hackers exploiting the names of leading technology companies to lure unsuspecting victims into scams that result in financial loss or malware infections. According to research from Check Point technology, scammers…
Microsoft and Google are top companies to scam users
Online users are increasingly becoming targets of phishing attacks, with hackers exploiting the names of leading technology companies to lure unsuspecting victims into scams that result in financial loss or malware infections. According to research from Check Point technology, scammers…