In an unprecedented move, the United Kingdom’s government is poised to publicly accuse China of orchestrating a cyber breach into its Electoral Commission’s database. The breach, occurring between August 2021 and October 2022, saw over 40 million voter records compromised.…
Category: Cybersecurity Insiders
Windows Server 2012 / 2012 R2 End of Life – Here’s How to Secure your Legacy Servers
Byline: Michael Gorelik, CTO of Morphisec Microsoft’s decision to end support for Windows Server 2012 and 2012 R2 should surprise no one. But the end of support for these decade-old operating systems is still catching many off guard. …
Will AI augment or annex cybersecurity jobs?
By Jamal Elmellas, Chief Operating Officer, Focus-on-Security Generative AI is expected to impact 60% of jobs in advanced economies like the UK according to the International Monetary Fund (IMF), half of which will gain from enhanced productivity while the other…
Multi-Cloud and Hybrid Cloud Backup: Best Practices to Reliably Secure Your Data
Organizations in different industries rely on cloud backups to secure critical business data. In recent years, backup to the cloud has evolved into an easy, flexible and effective technology. The two most common cloud backup strategies are multi-cloud backup and…
What It Takes to be a Cybersecurity Professional: The Non-Technical Skills You Need
Organizations around the world are being targeted – often from an unseen enemy. Cyberthreats are a plague on systems and data, and combatting them is costly and time-consuming. In order to defend against bad actors, organizations need the talent and…
IONIX Advances Industry Leading Attack Surface Management (ASM) Platform With Centralized Threat Center for Swift Zero-day Response
Tel Aviv-based IONIX has unveiled a groundbreaking enhancement to its Attack Surface Management (ASM) platform: the introduction of a centralized Threat Center designed to accelerate the response of security teams to newly disclosed zero-day vulnerabilities. This advancement comes at a…
Privacy concerns makes Airbnb ban security cameras indoors
Installing CCTV cameras has become a common practice in today’s society, offering a sense of security and providing potential video evidence in legal situations. However, concerns over privacy have emerged as some cameras are perceived as overly intrusive. In response…
Russia bans Microsoft followed by Amazon and Google
Russia implemented a sweeping ban on Microsoft Cloud services on March 20th, with plans to extend the prohibition to Google and Amazon web services in the coming weeks. While security analysts cite national security concerns as the primary motive, trade…
Unraveling the Cyber Threats Lurking Behind QR Codes
QR codes, once a simple tool for scanning and accessing information swiftly, have become a ubiquitous feature in our digital landscape. From restaurant menus to promotional materials, these square barcodes offer convenient access to websites, apps, and multimedia content with…
Now FCC endorses IoT products with Cyber Trust Mark Logo
The Federal Communications Commission, or FCC, is on the verge of introducing a cybersecurity labeling system for Internet of Things (IoT) products. This initiative aims to provide consumers with a clear indication of which smart devices meet basic cybersecurity standards.…
Five Steps to Overcoming Cyber Complacency
[By Mike Toole, Head of IT and Security at Blumira] It’s no secret that news about breaches and cyberattacks emerge daily. As a result of this constant exposure, even the most dedicated professionals understandably experience “data breach fatigue” and become…
Ransomware turns innovative and hides in websites where files are being uploaded
In recent times, the landscape of malware attacks has evolved beyond the traditional encryption tactics followed by ransom demands. A new breed of ransomware has emerged, distinct in its approach – it locks users from uploading files to websites. Researchers…
Biden Administration issues emergency alert against cyber-attacks on critical infrastructure
The Biden administration has issued a warning to all governors across the United States, urging them to be prepared for potential cyber-attacks on critical infrastructure by state-sponsored hackers. This precautionary measure comes amid concerns about recent cyber threats targeting essential…
Five 5G Security Concerns: Safeguarding the Future of Connectivity
The advent of 5G technology heralds a new era of connectivity, promising lightning-fast speeds, ultra-low latency, and vast network capacity. While 5G brings unprecedented opportunities for innovation and advancement, it also presents a host of security challenges that must be…
Kate Middleton Medical Record Data was hacked
The Princess of London, Kate Middleton, has been undergoing treatment for undisclosed health issues at ‘The London Clinic’ in recent weeks. However, reports from the Daily Mail suggest that hackers or a hacking group attempted to breach the medical data…
United Health spends $2 billion in ransomware recovery
UnitedHealth recently disclosed that it has disbursed approximately $2 billion to its healthcare subsidiaries affected by a ransomware attack detected last month. The company also announced plans to roll out medical claims preparation software to assist customers in managing payments…
CISA Hacked and over 70m files leaked online from AT&T database
In February of this year, the Cybersecurity and Infrastructure Security Agency (CISA) revealed that its systems had been compromised by hackers, exploiting vulnerabilities within Ivanti products utilized by the federal agency. According to a CISA spokesperson, flaws within Ivanti Connect…
FBI and Interpol issue cyber alerts on ransomware and pig butchering scams
The FBI, renowned for its investigative prowess, has disclosed a troubling statistic: nearly 20% of all ransomware attacks targeting critical infrastructure in the United States were aimed at the healthcare sector. This revelation underscores growing concerns about the safety and…
Ransomware attack on Fujitsu Servers
Reports have surfaced indicating that a hacking group specializing in ransomware has breached Fujitsu Servers’ computer network, purportedly stealing sensitive data. Details remain sparse, pending the conclusion of a thorough investigation by the IT company. While Fujitsu has yet to…
Demystifying Serverless Security: Safeguarding the Future of Cloud Computing
Serverless computing has revolutionized the landscape of cloud computing, offering unparalleled scalability, flexibility, and cost-effectiveness. However, as organizations increasingly adopt server-less architectures for their applications, concerns about security have risen to the forefront. Understanding and effectively addressing these security challenges…