1.) The ALPHV ransomware gang’s website, which provides information leaks and negotiation details, has been inaccessible for several hours. Telegram sources suggest that law enforcement linked to Euro-pol may have taken down the blog, which is only accessible through TOR.…
Category: Cybersecurity Insiders
A Comprehensive Cybersecurity Audit Checklist: Ensuring Digital Resilience
In an era dominated by digital advancements, the importance of cybersecurity cannot be overstated. Cybersecurity audits play a pivotal role in fortifying an organization’s defenses against evolving cyber threats. Whether you’re a business owner, IT professional, or security enthusiast, conducting…
Microsoft to offer glass based storage tech that is ransomware proof
Microsoft is actively engaged in the development of a glass-based data storage medium slated for integration into its data centers that facilitate Azure Cloud services. This innovative ceramics-based storage solution is specifically designed for archival purposes and is touted to…
Twitter fired its Information Security head for cutting budget on data security and privacy
Elon Musk has been making headlines recently, not only for his contentious remarks against his company’s investors but also for the abrupt dismissal of his Information Security head. The focus of the controversy lies in allegations made by Alan Rosa,…
Guidelines for Secure AI System Development
In an era where artificial intelligence (AI) plays an increasingly pivotal role across various industries, ensuring the security of AI systems has become a paramount concern. As AI technology continues to advance, developers and organizations must prioritize robust security measures…
Log4Shell: A Persistent Threat to Cybersecurity – Two Years On
[By Mike Walters, President and co-founder of Action1] Two years have passed since the cybersecurity world was rocked by the discovery of Log4Shell, a critical vulnerability in the Log4j library. First discovered on December 9, 2021, this legendary flaw exposed…
Getting Ahead of the Attack
[By Matt Wilson, vice president of product management, Netography] Being proactive is always good advice, but being proactive and being prepared when it comes to cybersecurity is a must. With threat actors maturing and constantly changing their methods, security teams…
Star Blizzard launched Cyber Attacks on UK since years
Star Blizzard, a hacking group allegedly sponsored by Russia’s intelligence agency Centre 18, has recently made headlines for engaging in long-term espionage on prominent figures in the United Kingdom, including top politicians, journalists, and bureaucrats. The discovery of this covert…
Why Infostealers are Stealing the Security Spotlight
The cybersecurity landscape is constantly evolving, with bad actors finding new and creative ways to exploit weaknesses. The threat from Malware continues to escalate with infostealers, an increasingly popular variant. Research found that 24% of malware is now infostealers, and…
Sierra Wireless routers are vulnerable to Cyber Attacks
Sierra Wireless, a Canadian company specializing in industrial web connectivity solutions, has recently come under scrutiny due to security concerns. Security experts have identified approximately 21 vulnerabilities in the software of its routers, such as OpenDNS and TinyXML. These vulnerabilities…
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program
[By Perry Carpenter, chief evangelist and security officer at KnowBe4] The threat landscape is evolving with new attack vectors and cyber threats surfacing almost daily. Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that…
Cyber Threat emerges out of Apple iOS 17 new NameDrop Feature
Apple’s recent update to iOS 17 introduced a new feature called NameDrop, enhancing data transfer capabilities for iPhone and Apple Watch users. This update allows seamless sharing of various files, including contacts, messages, photos, and videos. Despite its convenience, security…
Cyber and Physical Security Are Different, But They Must Work Together
[By Blake Benson, Senior Director – Industrial Cybersecurity Practice at ABS Group] America’s critical infrastructure faces more diverse threats than ever before. The rapid digitalization of many sectors and the relatively analog operational environments that exist in others have led…
UK to block all Social Media Scams
Starting May 2024, residents of the United Kingdom can breathe a sigh of relief, as social media platforms operating in the country have collectively committed to combating a range of scams on their respective networks. This includes everything from phishing…
Securing the Cloud: Strategies for CSPs to Mitigate Malware Hosting Risks
In recent years, the prevalence of cloud computing has revolutionized the way businesses operate, offering scalability, flexibility, and cost-efficiency. However, this technological shift has also attracted the attention of cyber-criminals who exploit cloud environments for hosting malware. Cloud Service Providers…
Nine 9 tips before putting your Android Smartphone or Apple iPhone for resale
Many Americans are likely considering selling their old smartphones to upgrade to the latest models released by OEMs, featuring innovative features and new operating systems. However, before selling your smartphone to a friend or a company, it’s crucial to take…
Thinking about a Career in Cloud Security? Follow this Path
As more critical data and assets move to the cloud, they’ve become prime targets for cybercriminals. Organizations worldwide need cloud security professionals who understand the evolving complexities to identify and mitigate security risks. Complicating matters, most are operating under a…
Microsoft issues alert on Cactus Ransomware spreading through DanaBOT Ransomware
Microsoft, the prominent American technology giant, has issued a cautionary alert regarding the proliferation of Cactus ransomware attacks disguised as the Danabot malvertising campaign. The primary goal of this malicious activity is to pilfer sensitive information, including credentials, or serve…
Britain Nuclear site Sellafield experiences malware cyber attack
Reports confirm that Sellafield, a prominent nuclear site, has fallen victim to a recent malware attack, with initial investigations suggesting the infiltration of malicious software dating as far back as 2015. Cybersecurity experts are actively engaged in probing the incident,…
Identifying Insider Threats: Addressing the Top Five Insider Threat Indicators
[By John Stringer, Head of Product, Next] Cybersecurity teams work extensively to keep external attackers out of their organization’s IT environment, but insider threats present a different, equally as difficult, challenge. Identifying insider threats is growing increasingly complex, and, as…