Category: Cybersecurity Insiders

Cerber Ransomware hackers target Atlassian Confleunce servers

A recent study conducted by the cybersecurity firm Rapid7 has revealed that multiple ransomware groups are actively targeting vulnerabilities in Atlassian Confluence Servers. One such criminal group, responsible for the distribution of Cerber Ransomware, is exploiting these vulnerabilities in Confluence…

Palo Alto Networks acquired Talon Cyber Security

Israel-based browser-based startup Talon Cyber Security has recently been acquired by the networking giant Palo Alto Networks. Palo Alto Networks has been actively integrating new technology into its existing products. Remarkably, this acquisition was not hindered by the ongoing conflict…

Cyber Attack news headlines trending on Google

1. Shimano, a cycle component manufacturing company, fell victim to a ransomware attack in which hackers managed to steal approximately 4.5 terabytes of sensitive business-related information. The incident is believed to be the work of the LockBit Ransomware gang and…

QR Codes are a Security Blindspot

By Mary Blackowiak, Director of Product Management and Development, AT&T Business Whether at the grocery store, eating dinner at a restaurant, locating a gate at the airport, gaining entry to an event, or even watching TV—QR codes are popping up…

Ransomware hits Infosys, Ace Hardware and Henry Schein

1.) A recent cyber attack targeted Infosys subsidiary, Infosys McCamish Systems, which was initially detected last week but only officially acknowledged this Tuesday. According to sources within our Cybersecurity Insiders, this incident appears to involve a ransomware variant, with further…

What is data security posture management

Data Security Posture Management (DSPM) is a comprehensive approach and set of tools and practices that organizations use to assess, manage, and improve their data security posture. It involves monitoring, evaluating, and enhancing data security measures to ensure the confidentiality,…

10 ways to know your smart phone has spying malware

Numerous world leaders have expressed concerns regarding espionage-related malware being surreptitiously planted on their personal devices by their adversaries. This clandestine practice aims to gather classified information or monitor their activities. Apple Inc. issued a statement yesterday, urging iPhone users…

Trending Cybersecurity News headlines on Google

Apple dismisses political controversy over its security alert Apple Inc has released a statement acknowledging attempts by state-sponsored actors to breach the devices of its users in various countries, including India. However, the company distanced itself from the ongoing espionage…

Top Cloud Misconfigurations Leading to Cloud Data Breaches

As organizations increasingly migrate their operations to the cloud, the security of their cloud infrastructure becomes a paramount concern. While cloud services offer numerous benefits, mis-configurations in cloud environments can inadvertently expose sensitive data and lead to catastrophic breaches. In…

Generative AI and Cybersecurity in a State of Fear, Uncertainty and Doubt

by Jason Rebholz, Chief Information Security Officer, Corvus Insurance Organizations are finding innumerable ways to incorporate generative artificial intelligence (GenAI) and large language model (LLM) technologies to speed up processes, gain efficiencies, eliminate repetitive, low-value tasks and enhance knowledge, among other uses.…

Generative AI: The Unseen Insider Threat

by Steve Povolny, Director, Security Research at Exabeam Artificial intelligence, or AI, as it’s commonly known, is all the rage these days. The widespread availability of free generative AI tools like ChatGPT has allowed the technology to be embraced by…