Tag: Cybersecurity Insiders

Organizations Need Fully Autonomous Security Powered by Gen-AI

Traditional approaches to security automation no longer suffice in today’s dynamic environments. Talent is getting scarce, and at the same time threat vectors are getting more complex. A fully autonomous security platform presents a big opportunity in the global cybersecurity…

Tesla wins data security concerns in China

Tesla Inc, the pioneering electric car manufacturer with aspirations in automated driving technology, has triumphed in gaining approval from China, overcoming previous concerns about data security. Several years ago, the Chinese government imposed a ban on the sale of Tesla…

Cyber Attack forces London Drugs to close temporarily

London Drugs, a British Columbia-based company with a robust pharmaceutical supply chain serving Western Canada, recently announced the closure of all 78 of its stores due to an IT issue. Subsequently, the pharmaceutical supply chain, through its official communication channel…

Facebook end to end encryption a Boon or a Bane

Meta, encompassing Facebook and its subsidiaries, has staunchly advocated the end-to-end encryption safeguarding its messaging platforms, assuring users of protection against government surveillance, individual snooping, or corporate intrusion. However, the allure of highly encrypted messaging services can inadvertently provide sanctuary…

Ransomware Attacks Shake Automotive and Beverage Industries

Volkswagen, a prominent German automaker, has recently fallen victim to a sophisticated cyber attack, believed to be a variant of ransomware. The attack targeted Volkswagen’s R&D servers, allowing hackers, suspected to be part of a notorious ransomware group, to access…

Ransomware testing being done on developing countries

In recent times, our attention has been drawn to ransomware attacks targeting both public and private entities. However, a new concern has emerged: ransomware testing. According to a report from cybersecurity firm ‘Performanta’, hackers are conducting ransomware tests in developing…

Overcoming security alert fatigue

Alert fatigue represents more than a mere inconvenience for Security Operations Centre (SOC) teams; it poses a tangible threat to enterprise security. When analysts confront a deluge of thousands of alerts daily, each necessitating triage, investigation, and correlation, valuable time…

Veeam acquires Coveware to boost its ransomware protection

Veeam, a leading provider of backup solutions, has announced its acquisition of Coveware, a cyber incident response firm, in a move aimed at enhancing its ransomware protection technology. The terms of the acquisition remain undisclosed. Coveware specializes in forensic investigation,…

More companies refuse to pay ransom in 2024

In 2024, a significant shift in corporate response to ransomware attacks has emerged, reflecting a resolute stance against capitulation to hackers’ demands for ransom payments. Coveware, a notable cybersecurity firm, has underscored this trend, revealing that merely 28% of affected…

Defining and Understanding Trust Assurance

Trust is perhaps the most foundational principle that shapes how businesses operate. It’s important to customers, partners, employees, and just about any stakeholder you can think of. The process of building, earning, and keeping trust for an organization is quite…

PRODUCT REVIEW: Safous Zero Trust Access

The Safous Zero Trust Access (ZTA) solution emerges as a comprehensive cybersecurity platform, designed to  tackle the growing challenges enterprises face in protecting digital assets in an increasingly interconnected and  dynamic world. With the rise of remote work, BYOD policies,…

FBI says Akira Ransomware group raked $42 million

The FBI, in collaboration with CISA, Europol European Cybercrime Centre, and the Netherlands NCSC, has issued a stark warning regarding the Akira Ransomware gang, which has amassed a staggering $42 million from approximately 230 companies as of January 24th, 2024.…

Possible Cyber Attack on 911 of 4 American States

The 911 emergency services experienced a significant outage in four states—Nebraska, South Dakota, Texas, and Nevada—sending shockwaves through the affected communities. Speculation points to a cyber attack orchestrated by Chinese intelligence, targeting all 50 states. However, only nine states were…

Microsoft and Google are top brands misused to scam users

Online users are increasingly becoming targets of phishing attacks, with hackers exploiting the names of leading technology companies to lure unsuspecting victims into scams that result in financial loss or malware infections. According to research from Check Point technology, scammers…

Microsoft and Google are top companies to scam users

Online users are increasingly becoming targets of phishing attacks, with hackers exploiting the names of leading technology companies to lure unsuspecting victims into scams that result in financial loss or malware infections. According to research from Check Point technology, scammers…

FTC slaps penalty for leaking sensitive health data to Facebook

The Federal Trade Commission, also known as the FTC, recently announced a significant settlement with the health firm Cerebral, requiring the company to pay $7,000,000 for mishandling patient information and inadvertently sharing sensitive details with advertising companies, such as Facebook.…

The Digital Future Needs Cybersecurity Leaders

We’re sure you have heard this before: the rate of technological change is accelerating. It is unpredictable and unprecedented. As the World Economic Forum acknowledges, the fourth industrial revolution brings “developments in previously disjointed fields such as artificial intelligence and…

Cyber Threat from Remember Me Checkbox

When logging into various online accounts, we often encounter a “Remember Me” checkbox, allowing us to stay logged in until we close and reopen the tab. This feature streamlines the login process and enhances convenience for users. However, what happens…

How to Safeguard Your Data Through Security Awareness Training?

Cyber threats are not only escalating in frequency but also growing more sophisticated, highlighting the indispensable role of cybersecurity awareness for both individuals and businesses. As cybercriminals employ increasingly advanced tactics, IT security awareness training becomes a pivotal defense mechanism. …

Streaming service ROKU witnessed 500K customers data leak

Roku, a leading provider of streaming services boasting approximately 80 million accounts, has confirmed a second cyber attack occurring in March of this year, potentially affecting around 500,000 of its customers. This incident stands distinct from the earlier attack in…

US House bill prohibits ransomware payments over $100,000

The US House of Representatives is on the brink of passing a significant bill aimed at curbing the scourge of ransomware attacks by prohibiting payments exceeding $100,000. The primary objective is to safeguard the nation’s financial infrastructure from the growing…

YouTube being used by hackers to spread Malware

When you’re casually browsing through YouTube channels and encounter a tempting link in the description, think twice before clicking. There’s a rising trend where these links can lead unsuspecting users straight into the jaws of malware. As the demand for…

2024 Cybersecurity Excellence Awards – Extended Deadline

Great news: By popular demand, we extended the deadline for the 2024 CYBERSECURITY EXCELLENCE AWARDS until April 27,2024. In the complex and dynamic world of cybersecurity, excellence often goes unnoticed. That’s where the Cybersecurity Excellence Awards come in. This isn’t just…

How information can be protected in hotel data breaches

In today’s flexible holiday landscape, where travelers enjoy getaways at various times of the year, the hospitality industry thrives. However, recent incidents like the cyber-attack on Omni Hotels underscore the importance of safeguarding guest data. Here are some key measures…

2024 Insider Threat Report Trends, Challenges, and Solutions

Introduction   Insider threats, driven by personal motivations and enabled by the rapid evolution of technology and changing  hybrid work environments, present a critical challenge to organizational security. Addressing these threats  necessitates a sophisticated, multi faceted approach that combines advanced…

Will Quantum Computing Change the Way We Use Encryption?

[By Jerry Derrick, Camelot Secure] Today, encryption is a cornerstone of our cybersecurity practices. It protects everything from cell phones and SMS messages to financial transactions and intellectual property. However, a new challenge in the complex landscape of encryption has…

Apple issues warning against Mercenary Spyware

Apple Inc has recently updated its threat notification system to include alerts for Mercenary Spyware targeting individuals and companies. Previously, starting from March 2021, Apple had been issuing alerts to users whose devices were targeted by state-sponsored attacks, a response…

The ClickOps Era Has Begun—Here’s a Quick Primer

[By Prashanth Nanjundappa, VP, Product Management, Progress] In the last decade, the codification and spread of DevOps best practices have transformed the day-to-day workings of businesses worldwide. Where development and operations were once needlessly siloed, they are now more closely…

Google top trending cybersecurity news headlines

Greylock Mckinnon Associates Data Breach Exposes Sensitive Information of 340,000 Individuals A significant cybersecurity incident has affected a defense contractor contracted by the Department of Justice (DoJ), resulting in the exposure of sensitive data belonging to over 340,000 individuals. The…

Google workspace to use AI for Data Security

Google has recently announced a significant upgrade to its Workspace platform, integrating cutting-edge Artificial Intelligence (AI) technology to enhance meetings and bolster data security. With this advancement, Gemini, Google’s AI-powered assistant, is set to revolutionize the experiences of over 3…

Ransomware threat to diminish in this year 2024

Exciting news arrives amidst the relentless surge of ransomware assaults that have plagued individuals and corporations, escalating into double and triple extortion schemes, instigating apprehension among internet users. However, a glimmer of hope emerges from the latest findings of a…

Cybersecurity Incidents Making Headlines on Google

Panera Bread Falls Victim to Ransomware Attack: Panera Bread, a popular chain of restaurants, recently faced a significant setback as it was targeted by a ransomware attack leading to a week-long IT outage. The attack, which was identified on March…

Avoiding Cloud Breaches: Top 5 Misconfigurations to Watch For

In today’s digital landscape, the migration to cloud computing has revolutionized how businesses operate, offering unparalleled flexibility, scalability, and efficiency. However, with great power comes great responsibility, and the improper configuration of cloud environments can lead to devastating data breaches.…

Hoya suffers a suspected ransomware attack

HOYA Corporation, a prominent Japanese brand known as the world’s second-largest optical manufacturer, has recently been targeted in a cyber attack suspected to be ransomware-related. Initially attributed to a system failure by company authorities, subsequent disruptions in other business subsidiaries…

Stream.Security Releases Suite of Next-Gen Features

Advanced Exposure Investigation and AI-Powered Remediation Capabilities Now Available    TEL AVIV – March 28, 2024 – Stream.Security, a leading platform for cloud solutions specializing in real-time digital twin technology, announced today the release of new advanced threat investigation and…

FBI shares some valuable insights on ransomware

The FBI, America’s premier law enforcement agency, has released a comprehensive report shedding light on the ongoing ransomware threat landscape. Here’s a summary of the key insights: Intermittent Encryption Tactics: Notably, the report highlights a common tactic among the top…

Seven tips to find spyware on a smart phone

To determine if your phone has spyware installed, you can follow these steps: 1.Check for Suspicious Apps: Review the list of installed apps on your phone. Look for any unfamiliar or suspicious apps that you don’t remember downloading. Spyware often…

Omni hotels hit by a possible ransomware attack

Omni Hotels, a Texas-based resort chain, has announced that some of its IT systems are experiencing technical difficulties, resulting in slowed or intentionally shut down digital services. While the incident is still under investigation, there are indications that it may…

Exploring the Threat of Data Poisoning in Cybersecurity

In today’s digitally driven world, data is often referred to as the new currency. With the exponential growth of data collection and utilization, ensuring its integrity and security has become paramount. However, amidst the efforts to safeguard data, a lesser-known…

Know the significance of World Cloud Security Day

Many individuals within the cloud industry may not be aware of World Cloud Security Day, which has been observed since 2019 on April 3, 2024. This significant day serves as an opportunity to raise awareness about the importance of safeguarding…

Ransomware criminals target backups for assured ransom

In recent times, the importance of maintaining efficient data backups as a defense against ransomware attacks has been repeatedly emphasized by security experts and law enforcement agencies. However, what happens when even these backups fall victim to encryption or deletion?…

The Future of Defense in an Era of Unprecedented Cyber Threats

[By Darren Guccione, CEO and Co-Founder, Keeper Security] Cyber attacks are becoming increasingly sophisticated as malicious actors leverage emerging technology to conduct, accelerate and scale their attacks. With AI-powered attacks at the helm, today’s IT and security leaders must contend…

Cybersecurity news headlines trending on Google

AT&T Acknowledges Data Breach AT&T, one of America’s leading telecom brands, has confessed to a significant data breach, revealing that sensitive information pertaining to millions of customers has been leaked onto the dark web. This breach has raised concerns about…

Google new Password Manager raises security concerns

Google, the pioneering service that originated with Gmail and marked its 20th anniversary on April 1st, 2024, has unveiled a new feature named ‘Password Manager.’ This service allows users to seamlessly transfer their passwords from their mobile devices to other…

What is innovative frictionless security

Innovative frictionless security refers to cutting-edge approaches and technologies that prioritize both security and user experience by minimizing or eliminating the barriers and inconveniences traditionally associated with security measures. At its core, frictionless security seeks to strike a balance between…