Orange España, the second-largest mobile operator in Spain, fell victim to a cyber-attack earlier this month, resulting in a disruption of mobile services lasting over three hours. Subsequent investigations by a group of security researchers unveiled that the assailants, identified…
Category: Cybersecurity Insiders
Australian companies breach no ransomware payment policy
In response to the surge in ransomware attacks over the last couple of years, the Australian government introduced legislation in 2022 prohibiting companies from making ransom payments. Despite this prohibition, a recent survey conducted by Cohesity, a firm specializing in…
Precision in Action: A Guide to Handling Cybersecurity Incidents
In an era dominated by digital connectivity, the importance of robust cybersecurity cannot be overstated. As organizations navigate the complex landscape of cyber threats, having a precise and effective response plan for handling cybersecurity incidents is crucial. This article provides…
Ransomware attack news trending on Google
Schneider Electric, a French-based company specializing in automation and energy management, recently fell victim to a Cactus Ransomware attack, resulting in the unauthorized access and theft of corporate data. The breach targeted Schneider Electric’s Electric Resource Advisor Cloud Platform, leading…
Cloud Data Security in 2024
[By Dan Benjamin, CEO and Co-Founder of Dig Security (acquired by Palo Alto Networks)] Large Language Models (LLMs) and generative AI were undoubtedly the biggest tech story of 2023. While the ever-changing nature of AI makes it difficult to predict…
Thinking about a Career in Cybersecurity? Follow this Path
With the current threats to cyber stability around the world, there’s never been a greater urgency for cybersecurity professionals than now. Organizations are investing more time, money and talent to detecting and mitigating cyberattacks. The result is a boom in…
Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions
Memcyco Inc, the real-time digital impersonation detection and prevention solution provider, and Deloitte, the leading consulting, advisory, and audit services firm, today announced their strategic partnership in the cybersecurity sector. The partnership enables Deloitte to extend this range of solutions…
Aembit Announces New Workload IAM Integration with CrowdStrike to Help Enterprises Secure Workload-to-Workload Access
Aembit, the Workload Identity and Access Management (IAM) platform that enables DevOps and security teams to discover, manage, enforce and audit access between workloads, today announced the availability of a new integration with the industry-leading CrowdStrike Falcon® platform to give…
Cybersecurity concerns rise with Elon Musk Telepathy Neuralink technology
Elon Musk’s company, Neuralink, has achieved a remarkable feat in replacing human brains with computer chips, allowing individuals to control electronic devices through neural signals, eliminating the need for physical movement. This breakthrough holds significant promise for those with permanent…
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day
Welcome to the world of data privacy, where safeguarding your digital life takes center stage! Every year, on the 28th of January, we celebrate Data Privacy Day – a global initiative dedicated to spreading awareness and championing best practices in…
BO Team hackers wipe 2 Peta Bytes Satellite data from Planeta
A hacking group affiliated with the Ukrainian government, known as BO Team, has asserted responsibility for the erasure of data from more than 280 servers connected to Planeta, a Russian meteorological and satellite service provider. Security experts’ preliminary analysis indicates…
Data Security concerns make US Cloud Companies impose ban on China AI Training
The Biden Administration, responding to requests from various think tanks, has implemented a ban on the utilization of resources from U.S. Cloud Companies by China for AI training purposes. This mirrors a similar move made by China under the leadership…
Essential Security Certifications for Consumer Mobile Devices: A Comprehensive Guide
In an era dominated by mobile technology, ensuring the security of consumer mobile devices has become paramount. Various certifications play a crucial role in establishing the trustworthiness of these devices, assuring users that their personal data and digital interactions are…
Generative AI banned by businesses because of data privacy risks
Generative AI has gained widespread adoption globally, finding application in customer service support and supply chain advisory roles. However, a study presented in the Cisco 2024 Data Privacy Benchmark reveals that approximately 27% of organizations have implemented a ban on…
Controversy Surrounds TFL’s Alleged Data Fraud and Hefty Penalties
Citizens residing in the European Union are facing challenges in settling fines sent by Transport for London (TFL), with penalties ranging from £1000 to £6000 or more. The concern lies not only in the imposed fines but also in the…
Top 10 Ways to Avoid Cybersecurity Misconfigurations
In the ever-evolving landscape of digital threats, cybersecurity mis-configurations have emerged as a significant vulnerability that can expose organizations to serious risks. Ensuring the security of your systems and networks requires proactive measures to prevent misconfigurations. Here are the top…
Headlines Trending on Google Regarding Recent Cyber Attacks
Kansas City Area Transportation Authority Faces Ransomware Attack on IT Infrastructure The Kansas City Area Transportation Authority (KCATA) has fallen victim to a digital attack on its IT infrastructure, suspected to be the work of a ransomware spreading gang, according…
REVIEW OF THE ISC2 CISSP CERTIFICATION
As companies increasingly embrace digital transformation, the cybersecurity threat environment constantly evolves. However, there is a notable shortage of skilled cybersecurity leaders. This is where the CISSP certification from ISC2 plays a crucial role in bridging this gap. Achieving this…
Ensuring Data Security in Retail ERP
Retail ERP systems are typically integrated with other key business systems, including eсommerce platforms, procurement and HR software, CRM, and POS tools. This turns them into centralized hubs for retail information, including customer information, payment data, purchase histories, customer preferences,…
Facebook and Instagram collect immense data from users
In today’s digital age, nearly one in ten individuals possesses a Facebook account, and a comparable user base is anticipated for Instagram, now under the ownership of Meta, the parent company of Facebook. However, the revelation that these platforms extensively…