“Over the past year, we’ve witnessed significant developments in cybersecurity, including the emergence of generative AI and its ability to enhance organizations’ threat intelligence efforts, and the rise of Threat Exposure Management, a program of consolidation to identify and mitigate…
Category: Cybersecurity Insiders
Addressing Legacy System Patching Neglect
By Joao Correia The persistent neglect of patching legacy systems has long affected critical infrastructure as well as nearly all major industries. At a time when the cyberthreat environment is teeming with new malware variants, cybercriminal groups and data-hungry hackers,…
To Navigate Cyberattacks Effectively, Start with Empathy
By Ric Opal, Principal and National Leader of IT Solutions and Strategic Partnerships at BDO Digital From username, password, and credit card hacking to other forms of authentication attacks, Microsoft blocked, on average, 4,000 identity authentication threats every second in…
E-commerce Security in the Cloud: Safeguarding Data in the Holiday Season
By Dan Benjamin, CEO and Co-Founder, Dig Security The holiday sales season is the most important time of year for e-commerce retailers, representing a time of heightened consumer activity and potential revenue growth. Retailers are forced to maintain security while balancing the consumer…
Blacksuit Ransomware linked to Royal Ransomware
As per an advisory from the FBI and US-CISA, a forthcoming ransomware variant is set to enter the cybersecurity landscape, marking itself as a rebrand or offshoot of the Royal Ransomware gang, notorious for purportedly amassing around $275 million in…
Cyber Security news headlines trending on Google
Morgan Stanley Agrees to $6.5 Million Settlement with Six States Over Data Breach Global financial services giant Morgan Stanley has reached a settlement of $6.5 million with six North American states for its failure to safeguard customer data, resulting in…
The Cyber Resilient CEO: Navigating the Digital Landscape with Vigilance
In an era dominated by rapid technological advancements and an ever-evolving digital landscape, the role of a CEO has transcended beyond traditional business acumen. Today, a new breed of leaders is emerging – the cyber resilient CEO. But what exactly…
How to Pitch Cybersecurity Packages
By Brandi Crown, Director of Sales at Syncro If you have a tool that has proven to improve threat protection for your clients, but you don’t know how to sell it effectively, it’s a lose-lose for everyone. Your client misses…
An Inside Look at Ransomware’s Record-Breaking Pace in 2023
Ryan Bell, Threat Intel Manager, Corvus Insurance There is still more than one month left in the books for 2023, and it’s safe to say that once we flip the calendar to January, we will have also closed the books…
FBI and CISA issues alert against Rhysida Ransomware Gang
Rhysida Ransomware, operating since December 2022, has garnered attention from the US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI). Both agencies have issued warnings about this ransomware, noting its unique capability to delete itself…
ALPHV Ransomware gang files SEC Complaint against a victim
In a groundbreaking development in the realm of ransomware, ALPHV, also known as BlackCAT, has taken an unprecedented step by filing a complaint with the Security and Exchange Commission (SEC) against a victim who failed to adhere to the stipulated…
AI In Cybersecurity: Exploring the Opportunities and Dangers
By Dr. Madhu Shashanka, Chief Data Scientist and Co-Founder, Concentric AI If you’ve been keeping with the news surrounding generative artificial intelligence (AI), you’re probably in one of two camps – optimistic or concerned. In the rapidly evolving world of…
UK labels AI Tools as a cyber threat to National Elections
Britain has identified the continued use of AI tools as a significant cyber threat to the upcoming national elections slated for January 2025. Emphasizing the increasing difficulty for security experts to track and neutralize these threats, particularly in the context…
Stream Security Takes on CloudSecOps
The cybersecurity industry has been rapidly transforming for well over a decade. With threat actors rapidly finding unique ways to expose vulnerabilities, organizations are constantly seeking the latest technology to protect their proprietary information, such as Intrusion Detection Systems (IDS)…
LockBit hiring young hackers to launch ransomware attacks
LockBit, a notorious ransomware gang, has consistently targeted major corporations, with victims ranging from Boeing and DP World to the Industrial and Commercial Bank of China and Allen and Overy. Recent revelations suggest that the hackers achieved their success by…
Navigating Cloud Security Compliance: Understanding FedRAMP, StateRAMP, and Key Differences
In the ever-evolving landscape of cloud computing, ensuring robust security measures is paramount. Federal and state governments, along with private enterprises, adhere to specific security compliance frameworks to safeguard sensitive data. This article will delve into the differences between FedRAMP,…
India to make CyberShield mandatory for Vehicles
India has emerged as a trailblazer in proactively addressing the looming threat of cyber attacks on domestically manufactured vehicles. This initiative aligns with guidelines established by the United Nations Economic Commission for Europe World Forum for Harmonization of Vehicle Regulation,…
PlexTrac Establishes UK and European Operations
Dedicated Organization Established to Deliver the Highest Level of Technical and Business Support to Existing Customers, Prospects and Partners LONDON, England, November 2, 2023 (Newswire.com) – PlexTrac, a pioneer in streamlining offensive security and pentest planning, reporting, and findings delivery, today…
Ransomware attack on Huber Heights drives it into Emergency
Huber Heights, a picturesque city in Ohio, found itself in a state of emergency due to a sophisticated ransomware attack that targeted several of its departments. City Manager Rick Dzik assured residents that efforts were underway to resolve the issue…
How Financial Services Firms Can Use Application Security Posture Management (ASPM) to Save Costs and Fill Cloud Security Posture Management (CSPM) Coverage Gaps
By Anna Tang, Information Security Officer, Data Theorem In recent years, financial services organizations have increasingly moved their applications and infrastructure to the cloud to take advantage of its scalability, flexibility, and cost-effectiveness. However, this shift to the cloud has…