[By Phil Robinson, Principal Security Consultant, Prism Infosec] Cyber maturity is all about ensuring the organisation is prepared for a cyber attack and that can only be determined by establishing where the risks lie and whether the controls that are…
Category: Cybersecurity Insiders
Breach Ready: Fortifying Your Defenses in the Age of Cyberattacks
[By Venky Raju, Field CTO, ColorTokens] In today’s highly digitalized and collaborative business environment, the likelihood of a cybersecurity breach is a matter of when, not if. Nearly every high-profile breach reported in the news has been a result of…
Google Chrome now offers phishing and malware protection
For those prioritizing a secure browsing experience, here’s some promising news: Google has announced that Chrome users utilizing the safe browsing mode will now receive automated protection against phishing, malware, and malicious sites. Google, renowned for its commitment to user…
Unveiling the True Purpose of Cyber Fraud Fusion Centers: Strengthening Digital Defense
In the ever-evolving landscape of cyber threats, organizations and governments worldwide are increasingly turning to collaborative efforts to combat the rising tide of cyber fraud. One such initiative gaining traction is the establishment of Cyber Fraud Fusion Centers. These centers…
Zscaler acquires Avalor for $350 million
Zscaler, a prominent player in cloud security, has made headlines with its recent acquisition of Israeli startup Avalor for a hefty $350 million. This move marks the third acquisition by Zscaler in recent times, following the purchases of Canonic for…
Ransomware news trending on Google
Alabama state websites down due to DDoS attacks Alabama state websites experienced a cyber disruption today as several government URLs were targeted by a sophisticated attack initially thought to be a variant of Ransomware but later identified as a Distributed…
Immutable data storage is last line of defense against ransomware
Ransomware attacks continue to escalate annually, prompting security analysts to advocate for strategies to combat the proliferation of malware. One recommended approach is the implementation of immutable data storage systems that are resistant to file-encrypting malware and can withstand sophisticated…
LockBit takedown surges Akira Ransomware Attacks
Following the takedown of the LockBit Ransomware group’s website in ‘Operation Cronos‘ by law enforcement agencies, there has been a notable surge in the activity of the Akira Ransomware group in recent weeks. This rise has been particularly pronounced since…
Organizations issue warning to Ransomware gangs about no money
In recent times, the landscape of cyber threats has been dominated by ransomware attacks, often involving double and triple extortion tactics. However, a new approach is emerging from publicly funded organizations, openly acknowledging their inability to pay ransoms and rendering…
Unseen Guardians: How Submarine Internet Cables in Deep Seas Thwart Cyber Attacks
In the modern digital age, where connectivity is paramount, the world’s reliance on the internet has never been greater. However, with this increased dependence comes a heightened risk of cyber attacks, posing significant threats to national security, economic stability, and…
Ransomware news headlines trending on Google
Ransomware Resilience: Evaluating UK’s Preparedness Strategy In the face of escalating ransomware attacks globally, no state or industry appears impervious to the threat posed by malicious malware. However, recent scrutiny suggests that the UK government’s approach to cybersecurity may be…
Cyber Attack on France government websites
Recently, hackers have shifted their attention to the government sector, with France’s government websites falling victim to sophisticated yet low-intensity cyber-attacks. A source from the office of France’s Prime Minister Gabriel Attal has suggested that these attacks on government servers…
Navigating the Labyrinth of Digital Cyberthreats Using AI-Powered Cryptographic Agility
[By Rebecca Krauthamer Chief Product Officer and Co-Founder of QuSecure; and Michelle Karlsberg, QuSecure Fellow] Imagine a labyrinth, continuously twisting and turning, morphing its layout so just when you think you’ve identified a safe path, the landscape shifts. Navigating it would be…
Navigating Ransomware: Securin’s Insights and Analysis from 2023
[By Ram Movva, CEO, Securin] As ransomware attackers continue to evolve and adapt their techniques, organizations must refine and adapt their security strategies to stay ahead of these threats. Human-augmented, actionable threat intelligence plays a critical role in every organization’s…
New Report Finds 81% of Defense SMBs Have Begun CMMC Compliance, Yet Struggle to Reach Certification
A staggering 81% of SMBs in the defense industrial base (DIB) have initiated the process for CMMC (Cybersecurity Maturity Model Certification) compliance, yet face significant hurdles in achieving certification levels, reveals a new report by RADICL. The DIB Cybersecurity Maturity…
America to offer compensation to victims of Deep Fake AI content
Deepfake technology has become a significant concern, producing computer-generated images, videos, and audio that mimic real individuals, leading to the dissemination of misleading and often absurd content. In response, the United States government, led by President Joe Biden, is poised…
A Comprehensive Guide to Mobile Application Security Testing
With the rapid proliferation of mobile applications across various industries, ensuring the security of these apps has become paramount. Mobile application security testing is a crucial step in the development process to identify and mitigate vulnerabilities that could be exploited…
Microsoft suspects Russian hackers still lurking in its corporate network
In a recent statement, Microsoft, the American software behemoth, has raised concerns over the presence of Russian state-funded hackers within its corporate network. Despite affirming that its software remains uncompromised, the company has warned of potential threats lurking within its…
Are We Experiencing the End of Biometrics?
[By John Gallagher, Vice President of Viakoo Labs] Biometric security is often viewed as superior to passwords when it comes to protecting sensitive systems or data. The interface between physical and software security, verified by unique personal identifiers like iris…
GenAI Regulation: Why It Isn’t One Size Fits All
[By André Ferraz, CEO and Co-Founder of Incognia, the innovator in location identity solutions] Generative artificial intelligence (GenAI) is a hot topic of conversation – particularly the risks it poses to users’ online safety and privacy. With President Biden calling on…