Marina Bay Sands (MBS), the renowned resort and luxury hotel situated in Singapore, recently experienced a data breach that impacted the personal information of more than 665,000 individuals associated with the MBS Loyalty Program. The breach occurred in mid-October of…
Category: Cybersecurity Insiders
Cerber Ransomware hackers target Atlassian Confleunce servers
A recent study conducted by the cybersecurity firm Rapid7 has revealed that multiple ransomware groups are actively targeting vulnerabilities in Atlassian Confluence Servers. One such criminal group, responsible for the distribution of Cerber Ransomware, is exploiting these vulnerabilities in Confluence…
Palo Alto Networks acquired Talon Cyber Security
Israel-based browser-based startup Talon Cyber Security has recently been acquired by the networking giant Palo Alto Networks. Palo Alto Networks has been actively integrating new technology into its existing products. Remarkably, this acquisition was not hindered by the ongoing conflict…
Cyber Attack news headlines trending on Google
1. Shimano, a cycle component manufacturing company, fell victim to a ransomware attack in which hackers managed to steal approximately 4.5 terabytes of sensitive business-related information. The incident is believed to be the work of the LockBit Ransomware gang and…
Exploring Different Types of Cybersecurity: Protecting the Digital Realm
In our increasingly interconnected world, the importance of cybersecurity cannot be overstated. The rapid advancement of technology has led to more sophisticated cyber threats, making it essential for individuals, businesses, and governments to safeguard their digital assets. Cyber-security encompasses a…
QR Codes are a Security Blindspot
By Mary Blackowiak, Director of Product Management and Development, AT&T Business Whether at the grocery store, eating dinner at a restaurant, locating a gate at the airport, gaining entry to an event, or even watching TV—QR codes are popping up…
Ransomware hits Infosys, Ace Hardware and Henry Schein
1.) A recent cyber attack targeted Infosys subsidiary, Infosys McCamish Systems, which was initially detected last week but only officially acknowledged this Tuesday. According to sources within our Cybersecurity Insiders, this incident appears to involve a ransomware variant, with further…
Palo Alto Networks acquires Dig Security n Accenture purchases Innotec Security
Palo Alto Networks, a cybersecurity company based in California, has officially announced its acquisition of the security startup ‘Dig Security,‘ although the exact purchase price remains undisclosed. The announcement comes after weeks of speculation on Reddit, suggesting that Dig initially…
What is data security posture management
Data Security Posture Management (DSPM) is a comprehensive approach and set of tools and practices that organizations use to assess, manage, and improve their data security posture. It involves monitoring, evaluating, and enhancing data security measures to ensure the confidentiality,…
Follow these cybersecurity tips while shopping for this Christmas 2023
Christmas 2023 is swiftly approaching, and many have already begun their lists of gifts for loved ones this holiday season. While some still adhere to the tradition of in-person store visits for their shopping, a growing number are opting for…
Samsung Galaxy users to get new Auto Blocker Mobile Security
Samsung Galaxy users who utilize either 5G or 4G models are about to receive an exciting new feature that grants them enhanced control over their devices. The company is gearing up to introduce “Auto Blocker” through the latest update via…
Weighing the Risks and Rewards of Generative AI for Business
by Matt Cloke, CTO at Endava Generative AI is poised to unleash the next wave of productivity, transform roles and boost performance across functions such as sales and marketing, customer operations and software development. According to a recent report by…
The Imperative of Accessibility in Security Awareness Training
by Michal Gal, Head of Product, CybeReady Cybersecurity, in an age of ubiquitous digitalization, has become a top priority for organizations worldwide. Integral to a strong cybersecurity posture is the ability to train all members of an organization, ensuring they…
10 ways to know your smart phone has spying malware
Numerous world leaders have expressed concerns regarding espionage-related malware being surreptitiously planted on their personal devices by their adversaries. This clandestine practice aims to gather classified information or monitor their activities. Apple Inc. issued a statement yesterday, urging iPhone users…
Trending Cybersecurity News headlines on Google
Apple dismisses political controversy over its security alert Apple Inc has released a statement acknowledging attempts by state-sponsored actors to breach the devices of its users in various countries, including India. However, the company distanced itself from the ongoing espionage…
Top Cloud Misconfigurations Leading to Cloud Data Breaches
As organizations increasingly migrate their operations to the cloud, the security of their cloud infrastructure becomes a paramount concern. While cloud services offer numerous benefits, mis-configurations in cloud environments can inadvertently expose sensitive data and lead to catastrophic breaches. In…
Seventh-annual Hacker-Powered Security Report Reveals Hackers’ Plans for GenAI, Bounty Milestones and More
HackerOne has just released its seventh-annual Hacker-Powered Security Report, based on data from its vulnerability database, views from HackerOne customers and more than 2,000 hackers on the platform. The goal in benchmarking hackers is to gain insight into their perspective on…
Generative AI and Cybersecurity in a State of Fear, Uncertainty and Doubt
by Jason Rebholz, Chief Information Security Officer, Corvus Insurance Organizations are finding innumerable ways to incorporate generative artificial intelligence (GenAI) and large language model (LLM) technologies to speed up processes, gain efficiencies, eliminate repetitive, low-value tasks and enhance knowledge, among other uses.…
AI CyberSecurity Risks: Equip Your Employees To Think Like a Hacker
By Eric Jacksch, CPP, CISM, CISSP, ELB Learning Cybersecurity Consultant The rapid expansion of AI has graced us with what seems like the gift that keeps on giving. We’ve been able to turn our words into works of art, effortlessly…
Generative AI: The Unseen Insider Threat
by Steve Povolny, Director, Security Research at Exabeam Artificial intelligence, or AI, as it’s commonly known, is all the rage these days. The widespread availability of free generative AI tools like ChatGPT has allowed the technology to be embraced by…