[By Richard Bird, Chief Security Officer, Traceable] In the wake of the devastating cyber-attack on Kyivstar, Ukraine’s largest telecommunications service provider, it’s time for a blunt conversation in the boardrooms of global enterprises. As someone who has navigated the cybersecurity…
Category: Cybersecurity Insiders
New Study Shows Over Half of Organizations Experienced Significant Security Incidents in The Last Year
In a newly released study from International Data Corporation (IDC) and cybersecurity company Exabeam, research shows companies globally are struggling with visibility when it comes to defending against cyberattacks. Fifty-seven percent of surveyed companies experienced significant security incidents in the…
OpenAI ‘upload file’ feature offers data security concerns
The integration of Artificial Intelligence (AI) tools into our daily routines has become an undeniable global phenomenon. However, as these AI tools undergo version upgrades, users’ concerns regarding data security are on the rise. One notable advancement in AI technology…
US State Department offers $10m reward on leads on ALPHV aka Blackcat ransomware
The Department of State, in its ongoing efforts to combat cybercrime, has announced a $10 million reward for information leading to the apprehension of ALPHV, also known as the Blackcat Ransomware Gang. This significant bounty underscores the severity of the…
Difference between Whale Phishing and Spear Phishing
Whale phishing and Spear phishing are both forms of targeted cyber-attacks aimed at stealing sensitive information or gaining unauthorized access to systems. However, they differ in their targets and scale: 1. Spear Phishing: Target: Spear phishing attacks target specific individuals…
SEC admits on Twitter X that security lapses led to account hack
The U.S. Securities and Exchange Commission (SEC) has made a significant announcement regarding the security of its X account, affirming the implementation of 2-factor authentication to bolster its defenses. Emphasizing its commitment to fortifying security measures, the SEC aims to…
Cyber Attack news headlines trending on Google
Bank of America Data Breach by Infosys Bank of America (BOA) has filed accusations against Infosys US, alleging a data breach that compromised details of its employees and some customers. The breach report was submitted to the Office of Maine…
Black Basta Ransomware targets Southern Water
Southern Water, responsible for managing the UK’s water and waste facilities, made an official statement on February 12, 2024, revealing the impact of a ransomware attack that occurred in the second week of January. The breach potentially affected approximately 5%…
No formal education is needed for Cybersecurity Professionals say experts
In recent times, the criteria for landing coveted job positions have often included a laundry list of prerequisites: educational qualifications, certifications, and substantial prior experience. However, when it comes to the realm of cybersecurity, experts are challenging this traditional mindset,…
How to maintain security across multi cloud environments
Maintaining security across multi-cloud environments requires a comprehensive approach that encompasses various aspects of security. Here are some key steps you can take: 1. Centralized Identity and Access Management (IAM): Implement a centralized IAM solution to manage user identities, roles,…
Cybercrime in Scotland upsurges like an Epidemic
Scotland’s police have officially declared a troubling surge in cyber crime within their jurisdiction, indicating a doubling of incidents compared to the previous year. This alarming trend is expected to escalate further in the coming months. The proliferation of technologies…
Top Ransomware news headlines trending on Google
A ransomware assault targeting the Office of Colorado State Public Defender (CSPD) has compelled the IT personnel to shut down the entire computer network as a precautionary measure to contain the malware’s spread. Consequently, only critical response infrastructure and court…
Spear Phishing attacks on Microsoft365 and Azure Accounts
Microsoft, the renowned technology giant based in the United States, has recently made headlines due to targeted spear phishing campaigns aimed at thousands of individual accounts utilizing Microsoft 365 and Azure Services. These attacks, which have been active since November…
Google to block mass emails to its Gmail users from April 2024
In April 2024, Google has announced a significant move to block all mass emails targeted at its Gmail users. This decision, made official by Alphabet Inc.’s subsidiary, signifies a shift in digital communication practices and imposes stricter regulations on bulk…
Essential Knowledge for Aspiring Cybersecurity Analysts: A Comprehensive Guide
In today’s digital age, where cyber threats are increasingly sophisticated and prevalent, the role of cybersecurity analysts has become indispensable. These professionals play a crucial role in safeguarding organizations’ digital assets and ensuring the integrity and confidentiality of sensitive information.…
Microsoft to release its Windows Germanium with AI Security
Microsoft is gearing up for the forthcoming update to its Windows 11 operating system, tentatively named “Germanium.” Insiders within the company have hinted that this new release, expected in September 2024, will integrate advanced AI security measures, making it highly…
France data breach triggers among half of the populace
A significant cyber-attack has rocked France, with data from over 33 million individuals—roughly half of the country’s population—falling victim to this sophisticated breach earlier this month. This breach marks a potentially unprecedented event in the nation’s history, according to reports.…
Enhancing Application Code Security: Best Practices and Strategies
In today’s digital landscape, the security of application code is paramount to protect sensitive data, prevent unauthorized access, and safeguard against cyber threats. As technology advances, so do the techniques used by malicious actors to exploit vulnerabilities in software. Therefore,…
Navigating the Cybersecurity Skills Gap in Critical Infrastructure
[By Irfan Shakeel, Vice President of Training and Certification Services at OPSWAT] Addressing the cybersecurity skills gap stands out as a paramount challenge in fortifying companies’ cyber resilience today. Especially given that the remedy is neither swift nor straightforward. Transforming…
North Korea raked $3 billion from Ransomware and US offers $10m for Hive
Recent estimates suggest that North Korea has amassed approximately $3 billion through a series of ransomware attacks targeting businesses and other cyber-attacks on cryptocurrency trading platforms. These illicit gains are believed to be directed towards supporting Kim Jong Un’s nuclear…