Category: Cybersecurity Insiders

Ransomware attacks witnessed 55% surge in 2023

The conclusion of the year 2023 witnessed an alarming 55% surge in ransomware attacks, as reported by Cyberint, a company specializing in threat intelligence services. In comparison to the preceding year’s 2034 victims, ransomware gangs targeted approximately 4356 victims in…

A Comprehensive Guide to Penetration Testing in Public Clouds

As organizations increasingly migrate their operations to public cloud environments, the need for robust security measures has never been more critical. Cloud penetration testing emerges as a crucial component in ensuring the integrity and resilience of systems hosted in public…

Getting Real About Ransomware

[By John Spiegel, Director of Strategy & Field CTO, Axis Security] In 2022, 66% of businesses worldwide were impacted by Ransomware in some form.  This may be breach, a 3rd party they depend on was hacked or sensitive data was…

A simple guidance on obtaining effective endpoint security

Endpoint Security means securing the endpoints connected to/in a network. And here’s a general guide on how to implement endpoint security in true meaning: 1. Assessment and Planning: Assess your organization’s security needs, considering the types of devices used and…

What to do when social media accounts get hacked or impersonated

In the era of social media, users freely share a plethora of information with their connections and followers, often overlooking the potential threat to their privacy. Opportunistic hackers seize on these vulnerabilities, infiltrating or impersonating accounts and causing significant trouble…

Hackers promise to delete ransomware data for small fees

Hackers have ventured into a novel business tactic that pledges to delete data stolen by ransomware attackers, offering a dubious assurance to victims in exchange for a modest fee, typically ranging from 1-2 BTC. The modus operandi involves certain ransomware…

Vodafone network not down by Cyber Attack

When Vodafone users in the UK found themselves grappling with network downtime on their mobile phones, a segment of them turned to various social media platforms to express their frustration. While many were eager to learn when normal network services…

PRODUCT REVIEW: ENEA QOSMOS THREAT DETECTION SDK

The evolution of network environments towards distributed, cloud-centric architectures in the work-from-anywhere era has brought unique challenges to network security. The industry’s shift to comprehensive cloud-based services like Secure Access Service Edge (SASE), Security Service Edge (SSE), and Secure SD-WAN…

How to smartly tackle BlackCat Ransomware group

In 2023, the BlackCat, also known as ALPHV ransomware group, achieved remarkable success by nearly accumulating $700 million through the encryption of databases. Among its victims were three Fortune 500 companies, numerous financial institutions, and businesses in the hospitality sector,…