In 2024, many organizations operate with a newly expanded attack surface. Even though most already invest significantly in cybersecurity. All companies are acutely aware of the threat posed by cyberattacks and the resulting data breaches. And sadly, many have already…
Tag: Cybersecurity Insiders
Meet the Phishing service platform named Darcula
Cybersecurity analysts at Netcraft, an internet service company based in London, have recently uncovered a sophisticated phishing platform dubbed ‘Darcula.’ This platform, known as a phishing-as-a-service (PhaaS) operation, provides users with template-based guidance for setting up phishing websites. What sets…
Hot Topic customers targeted by Credential Stuffing attacks
Hot Topic, the American fashion retailer, experienced two waves of credential stuffing attacks in November of the previous year. Investigations have revealed that these attacks resulted in the leakage of customer information, including partial payment data. Credential stuffing involves hackers…
ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On
In a decisive move against the escalating wave of cyber threats, ThreatHunter.ai has announced a groundbreaking initiative to offer its advanced cybersecurity services free for 30 days to all organizations. This bold step comes in response to the alarming increase…
Understanding the Surge in Cyber Kidnapping: Exploring the Factors Behind the Rise
In recent years, the world has witnessed a concerning uptick in cyber kidnappings, with individuals, organizations, and even governments falling victim to this malicious form of digital extortion. This article delves into the multifaceted reasons contributing to the rise of…
C2A Security’s EVSec Platform: Driving Cybersecurity Compliance in the Automotive Industry
The automotive industry is under pressure to comply with a variety of cybersecurity regulations and standards, including UN Regulation No. 155, ISO/SAE 21434, and Chinese GB Standards. The year 2024 marks a crucial period for these regulations, especially UN Regulation…
NHS patient data published on the Dark Web
In a concerning development, a well-known ransomware collective known as INC Ransom has recently disclosed a portion of pilfered data linked to the UK’s National Health Service (NHS) on the obscure corners of the internet known as the dark web.…
The human-AI partnership: a guide towards secure coding
[Pieter Danhieux Co-Founder and CEO, Secure Code Warrior] The doomsayers are, so far, losing the argument. The panic around AI replacing humans has been countered with a new narrative: “Let AI redefine your job rather than replace it.” According to…
Cyber Attack suspected behind Baltimore Bridge Collapse
The incident that shook Baltimore on March 26, 2024, when a cargo vessel collided with the Baltimore Bridge, resulting in its collapse into the Patapsco River, has sparked widespread speculation and concern. In the early hours of March 27, 2024,…
Ransomware attack on Big Issue and University of Winnipeg
The Qilin Ransomware group is under scrutiny for breaching the servers of the UK-based newspaper ‘The Big Issue Group.’ Reports indicate that the perpetrators successfully accessed confidential data from the victim and are now holding the entire database hostage, encrypting…
Has the third world war started with Baltimore Bridge Collapse with Cyber Attack
The incident that shook Baltimore on March 26, 2024, when a cargo vessel collided with the Baltimore Bridge, resulting in its collapse into the Patapsco River, has sparked widespread speculation and concern. In the early hours of March 27, 2024,…
Agenda Ransomware Targeting VMware and 17k Microsoft Exchange servers vulnerable to cyber attacks
Agenda Ransomware targets VMware servers A recent emergence in the cyber threat landscape has revealed the presence of a new variant of ransomware known as Agenda Ransomware, which has swiftly made its mark by targeting VMware ESXi servers worldwide. This…
Securing Mobile Application Development: 9 Best Practices for Data Security
In today’s interconnected world, mobile applications play a pivotal role in our daily lives, facilitating everything from communication and entertainment to productivity and commerce. However, with the proliferation of mobile apps comes the heightened risk of data breaches and security…
New Zealand accuses China for hacking the Parliament
After the United Kingdom’s purported accusation against China of launching a cyber attack on its Electoral Commission in 2021, allegedly aimed at stealing data pertaining to over 40 million voters, New Zealand (NZ) government has directly pointed fingers at China…
How personalized phish training can thwart evolving cyberattacks
[By: Matt Lindley, COO and CISO at NINJIO] Although the cyberthreat landscape is constantly shifting, several major cybercriminal tactics have stood the test of time. Phishing is one of them. Despite being among the best-known cyberthreats, the damage inflicted by…
Medusa Ransomware group demands $700k from victims
Tarrant Appraisal District (TAD), a governmental entity in Texas, has made headlines due to a sophisticated cyber attack suspected to be orchestrated by the Medusa Ransomware group. The incident came to light on March 24th, 2024, prompting an emergency meeting…
Hackers steal Roku credit card details to make fraudulent purchases
Hackers have reportedly gained unauthorized access to credit card information from approximately 15,000 Roku accounts, according to a disclosure from the media streaming company. With a user base exceeding 80 million active accounts, Roku has become a prime target for…
Understanding the Various Types of DDoS Attacks and Their Implications
In today’s interconnected digital world, Distributed Denial of (DDoS) attacks have emerged as a significant threat to online businesses, organizations, and even individuals. These attacks can disrupt essential services, compromise sensitive data, and incur substantial financial losses. Understanding the different…
Over 40m UK voters personal data breached in hack by China
In an unprecedented move, the United Kingdom’s government is poised to publicly accuse China of orchestrating a cyber breach into its Electoral Commission’s database. The breach, occurring between August 2021 and October 2022, saw over 40 million voter records compromised.…
Windows Server 2012 / 2012 R2 End of Life – Here’s How to Secure your Legacy Servers
Byline: Michael Gorelik, CTO of Morphisec Microsoft’s decision to end support for Windows Server 2012 and 2012 R2 should surprise no one. But the end of support for these decade-old operating systems is still catching many off guard. …
Will AI augment or annex cybersecurity jobs?
By Jamal Elmellas, Chief Operating Officer, Focus-on-Security Generative AI is expected to impact 60% of jobs in advanced economies like the UK according to the International Monetary Fund (IMF), half of which will gain from enhanced productivity while the other…
Multi-Cloud and Hybrid Cloud Backup: Best Practices to Reliably Secure Your Data
Organizations in different industries rely on cloud backups to secure critical business data. In recent years, backup to the cloud has evolved into an easy, flexible and effective technology. The two most common cloud backup strategies are multi-cloud backup and…
What It Takes to be a Cybersecurity Professional: The Non-Technical Skills You Need
Organizations around the world are being targeted – often from an unseen enemy. Cyberthreats are a plague on systems and data, and combatting them is costly and time-consuming. In order to defend against bad actors, organizations need the talent and…
IONIX Advances Industry Leading Attack Surface Management (ASM) Platform With Centralized Threat Center for Swift Zero-day Response
Tel Aviv-based IONIX has unveiled a groundbreaking enhancement to its Attack Surface Management (ASM) platform: the introduction of a centralized Threat Center designed to accelerate the response of security teams to newly disclosed zero-day vulnerabilities. This advancement comes at a…
Privacy concerns makes Airbnb ban security cameras indoors
Installing CCTV cameras has become a common practice in today’s society, offering a sense of security and providing potential video evidence in legal situations. However, concerns over privacy have emerged as some cameras are perceived as overly intrusive. In response…
Russia bans Microsoft followed by Amazon and Google
Russia implemented a sweeping ban on Microsoft Cloud services on March 20th, with plans to extend the prohibition to Google and Amazon web services in the coming weeks. While security analysts cite national security concerns as the primary motive, trade…
Unraveling the Cyber Threats Lurking Behind QR Codes
QR codes, once a simple tool for scanning and accessing information swiftly, have become a ubiquitous feature in our digital landscape. From restaurant menus to promotional materials, these square barcodes offer convenient access to websites, apps, and multimedia content with…
Now FCC endorses IoT products with Cyber Trust Mark Logo
The Federal Communications Commission, or FCC, is on the verge of introducing a cybersecurity labeling system for Internet of Things (IoT) products. This initiative aims to provide consumers with a clear indication of which smart devices meet basic cybersecurity standards.…
Five Steps to Overcoming Cyber Complacency
[By Mike Toole, Head of IT and Security at Blumira] It’s no secret that news about breaches and cyberattacks emerge daily. As a result of this constant exposure, even the most dedicated professionals understandably experience “data breach fatigue” and become…
Ransomware turns innovative and hides in websites where files are being uploaded
In recent times, the landscape of malware attacks has evolved beyond the traditional encryption tactics followed by ransom demands. A new breed of ransomware has emerged, distinct in its approach – it locks users from uploading files to websites. Researchers…
Biden Administration issues emergency alert against cyber-attacks on critical infrastructure
The Biden administration has issued a warning to all governors across the United States, urging them to be prepared for potential cyber-attacks on critical infrastructure by state-sponsored hackers. This precautionary measure comes amid concerns about recent cyber threats targeting essential…
Five 5G Security Concerns: Safeguarding the Future of Connectivity
The advent of 5G technology heralds a new era of connectivity, promising lightning-fast speeds, ultra-low latency, and vast network capacity. While 5G brings unprecedented opportunities for innovation and advancement, it also presents a host of security challenges that must be…
Kate Middleton Medical Record Data was hacked
The Princess of London, Kate Middleton, has been undergoing treatment for undisclosed health issues at ‘The London Clinic’ in recent weeks. However, reports from the Daily Mail suggest that hackers or a hacking group attempted to breach the medical data…
United Health spends $2 billion in ransomware recovery
UnitedHealth recently disclosed that it has disbursed approximately $2 billion to its healthcare subsidiaries affected by a ransomware attack detected last month. The company also announced plans to roll out medical claims preparation software to assist customers in managing payments…
CISA Hacked and over 70m files leaked online from AT&T database
In February of this year, the Cybersecurity and Infrastructure Security Agency (CISA) revealed that its systems had been compromised by hackers, exploiting vulnerabilities within Ivanti products utilized by the federal agency. According to a CISA spokesperson, flaws within Ivanti Connect…
FBI and Interpol issue cyber alerts on ransomware and pig butchering scams
The FBI, renowned for its investigative prowess, has disclosed a troubling statistic: nearly 20% of all ransomware attacks targeting critical infrastructure in the United States were aimed at the healthcare sector. This revelation underscores growing concerns about the safety and…
Ransomware attack on Fujitsu Servers
Reports have surfaced indicating that a hacking group specializing in ransomware has breached Fujitsu Servers’ computer network, purportedly stealing sensitive data. Details remain sparse, pending the conclusion of a thorough investigation by the IT company. While Fujitsu has yet to…
Demystifying Serverless Security: Safeguarding the Future of Cloud Computing
Serverless computing has revolutionized the landscape of cloud computing, offering unparalleled scalability, flexibility, and cost-effectiveness. However, as organizations increasingly adopt server-less architectures for their applications, concerns about security have risen to the forefront. Understanding and effectively addressing these security challenges…
Immature equals insecure: why cybersecurity maturity testing is a must
[By Phil Robinson, Principal Security Consultant, Prism Infosec] Cyber maturity is all about ensuring the organisation is prepared for a cyber attack and that can only be determined by establishing where the risks lie and whether the controls that are…
Breach Ready: Fortifying Your Defenses in the Age of Cyberattacks
[By Venky Raju, Field CTO, ColorTokens] In today’s highly digitalized and collaborative business environment, the likelihood of a cybersecurity breach is a matter of when, not if. Nearly every high-profile breach reported in the news has been a result of…
Google Chrome now offers phishing and malware protection
For those prioritizing a secure browsing experience, here’s some promising news: Google has announced that Chrome users utilizing the safe browsing mode will now receive automated protection against phishing, malware, and malicious sites. Google, renowned for its commitment to user…
Unveiling the True Purpose of Cyber Fraud Fusion Centers: Strengthening Digital Defense
In the ever-evolving landscape of cyber threats, organizations and governments worldwide are increasingly turning to collaborative efforts to combat the rising tide of cyber fraud. One such initiative gaining traction is the establishment of Cyber Fraud Fusion Centers. These centers…
Zscaler acquires Avalor for $350 million
Zscaler, a prominent player in cloud security, has made headlines with its recent acquisition of Israeli startup Avalor for a hefty $350 million. This move marks the third acquisition by Zscaler in recent times, following the purchases of Canonic for…
Ransomware news trending on Google
Alabama state websites down due to DDoS attacks Alabama state websites experienced a cyber disruption today as several government URLs were targeted by a sophisticated attack initially thought to be a variant of Ransomware but later identified as a Distributed…
Immutable data storage is last line of defense against ransomware
Ransomware attacks continue to escalate annually, prompting security analysts to advocate for strategies to combat the proliferation of malware. One recommended approach is the implementation of immutable data storage systems that are resistant to file-encrypting malware and can withstand sophisticated…
LockBit takedown surges Akira Ransomware Attacks
Following the takedown of the LockBit Ransomware group’s website in ‘Operation Cronos‘ by law enforcement agencies, there has been a notable surge in the activity of the Akira Ransomware group in recent weeks. This rise has been particularly pronounced since…
Organizations issue warning to Ransomware gangs about no money
In recent times, the landscape of cyber threats has been dominated by ransomware attacks, often involving double and triple extortion tactics. However, a new approach is emerging from publicly funded organizations, openly acknowledging their inability to pay ransoms and rendering…
Unseen Guardians: How Submarine Internet Cables in Deep Seas Thwart Cyber Attacks
In the modern digital age, where connectivity is paramount, the world’s reliance on the internet has never been greater. However, with this increased dependence comes a heightened risk of cyber attacks, posing significant threats to national security, economic stability, and…
Ransomware news headlines trending on Google
Ransomware Resilience: Evaluating UK’s Preparedness Strategy In the face of escalating ransomware attacks globally, no state or industry appears impervious to the threat posed by malicious malware. However, recent scrutiny suggests that the UK government’s approach to cybersecurity may be…
Cyber Attack on France government websites
Recently, hackers have shifted their attention to the government sector, with France’s government websites falling victim to sophisticated yet low-intensity cyber-attacks. A source from the office of France’s Prime Minister Gabriel Attal has suggested that these attacks on government servers…
Navigating the Labyrinth of Digital Cyberthreats Using AI-Powered Cryptographic Agility
[By Rebecca Krauthamer Chief Product Officer and Co-Founder of QuSecure; and Michelle Karlsberg, QuSecure Fellow] Imagine a labyrinth, continuously twisting and turning, morphing its layout so just when you think you’ve identified a safe path, the landscape shifts. Navigating it would be…
Navigating Ransomware: Securin’s Insights and Analysis from 2023
[By Ram Movva, CEO, Securin] As ransomware attackers continue to evolve and adapt their techniques, organizations must refine and adapt their security strategies to stay ahead of these threats. Human-augmented, actionable threat intelligence plays a critical role in every organization’s…
New Report Finds 81% of Defense SMBs Have Begun CMMC Compliance, Yet Struggle to Reach Certification
A staggering 81% of SMBs in the defense industrial base (DIB) have initiated the process for CMMC (Cybersecurity Maturity Model Certification) compliance, yet face significant hurdles in achieving certification levels, reveals a new report by RADICL. The DIB Cybersecurity Maturity…
America to offer compensation to victims of Deep Fake AI content
Deepfake technology has become a significant concern, producing computer-generated images, videos, and audio that mimic real individuals, leading to the dissemination of misleading and often absurd content. In response, the United States government, led by President Joe Biden, is poised…
A Comprehensive Guide to Mobile Application Security Testing
With the rapid proliferation of mobile applications across various industries, ensuring the security of these apps has become paramount. Mobile application security testing is a crucial step in the development process to identify and mitigate vulnerabilities that could be exploited…
Microsoft suspects Russian hackers still lurking in its corporate network
In a recent statement, Microsoft, the American software behemoth, has raised concerns over the presence of Russian state-funded hackers within its corporate network. Despite affirming that its software remains uncompromised, the company has warned of potential threats lurking within its…
Are We Experiencing the End of Biometrics?
[By John Gallagher, Vice President of Viakoo Labs] Biometric security is often viewed as superior to passwords when it comes to protecting sensitive systems or data. The interface between physical and software security, verified by unique personal identifiers like iris…
GenAI Regulation: Why It Isn’t One Size Fits All
[By André Ferraz, CEO and Co-Founder of Incognia, the innovator in location identity solutions] Generative artificial intelligence (GenAI) is a hot topic of conversation – particularly the risks it poses to users’ online safety and privacy. With President Biden calling on…
SIM linked data security measure to defend against phishing attacks
Stolen bank account credentials have been a persistent issue in countries like Britain, the United States, Australia, and Canada, often resulting in significant financial losses. However, Singapore’s leading telecommunications company, Singtel, has introduced an innovative solution to combat such phishing…
Thinking about a Career in Network Security? Follow This Path
Network security professionals protect the confidentiality, integrity and availability of information across the network. They’re expert at applying strategies, processes and technologies that guard against unauthorized access and harm. Are you ready for a career in network security? ISC2, creator…
Understanding Types of Cloud Malware and Effective Defense Strategies
In recent years, as businesses and individuals increasingly rely on cloud computing services for storage, collaboration, and data processing, cyber-criminals have adapted their tactics to target cloud environments. Cloud malware poses a significant threat to the security and integrity of…
Play ransomware leaks Swiss government data comprising sensitive information
In a resurgence of cyber threats, the notorious PLAY Ransomware gang has once again captured headlines. Following an update from the FBI, which identified the Play ransomware gang as responsible for targeting more than 300 organizations, the gang is now…
Google opens first ever Cyberdefense hub in Japan
Amid escalating Chinese cyber attacks targeting government infrastructure globally, Google has inaugurated its inaugural Asia-Pacific Cyberdefense center in Tokyo, Japan. This hub is poised to serve as a pivotal nexus for information exchange and research collaboration among businesses, governmental entities,…
Cyber Attack on Canada FINTRAC and IBM Cyber Attack response training
FINTRAC Canada targeted by a cyber attack FINTRAC, Canada’s financial intelligence agency, has fallen victim to a cyber attack, prompting the shutdown of its computer networks. While the servers of the federal agency have been taken offline, assurances have been…
Crowdstrike to acquire Flow Security
CrowdStrike, an American cybersecurity technology company, has officially announced its acquisition of the Israel-based startup ‘Flow Security’ for $200 million. Flow Security is known as the world’s sole provider of cloud data runtime security solutions, uniquely safeguarding data both at…
Facebook and Instagram down by Cyber Attack
Shortly after millions of Facebook and Instagram users encountered difficulties accessing their accounts, speculation quickly arose that a state-funded cyberattack might be to blame. Mark Zuckerberg, fresh from a vacation in India, promptly took to Twitter, now X, to assure…
Safeguarding Your Digital Reputation: Best Practices for Secure Data Erasure
In today’s interconnected world, maintaining a pristine digital reputation is paramount. Whether you’re an individual, a business, or an organization, the risk of cyber embarrassment stemming from leaked or improperly disposed of data looms large. From personal photos and sensitive…
Ransomware news headlines trending on Google
Hamilton city announces emergency after ransomware attack It seems like there’s a surge in ransomware attacks lately, affecting various sectors from municipal services to healthcare and even international politics. The situation in Hamilton City sounds quite serious, especially with essential…
Continuous Threat Management’s Strong, Proactive Protection Against CVEs
[By Lydia Zhang, President and Co-founder of Ridge Security] Organizations face constant threats from vulnerabilities that can exploit their systems and compromise sensitive data. Common Vulnerabilities and Exposures (CVEs) are one such concern, posing significant risks to organizations of all…
North Korea launches cyber-attacks on Semiconductor industry
North Korea, under the leadership of Kim Jong-un, faces stringent sanctions from Western nations, exacerbating the nation’s dire shortage of semiconductor equipment crucial for its nuclear, satellite, and intelligence operations. In response to this scarcity, North Korea has intensified its…
Don’t Believe the Hype: Myth-busting Zero Trust Marketing
[By Rob McNutt, SVP Network Security at Forescout] The greatest threat to zero trust is not among a group of the usual cybersecurity suspects. It is the marketing hype that has led to unrealistic expectations about its capabilities. The ability…
Proactive Patching Translates into Less Ransomware Payouts
[By Joao Correia, Technical Evangelist at TuxCare (www.tuxcare.com), a global innovator in enterprise-grade cybersecurity for Linux] Today’s threat actors are driven by a variety of potential motivators for attacking systems and networks. They may aim to disrupt entire economies, advocate…
American Express Customer Data Compromised in Third-Party Service Provider Breach
In a concerning development for financial security, American Express has announced that its customers’ credit card information has been compromised in a data breach. The breach occurred through a third-party service provider, marking another significant event in a series of…
Can ban on ransom payments block ransomware spread
Recently, the FBI initiated a global operation aimed at disrupting the infrastructure utilized by the ALPHV hackers responsible for spreading ransomware. Despite this effort, the criminal group managed to bounce back swiftly and launched even more sophisticated attacks. Just a…
AI-Fueled Cyber-Attacks: A Growing Threat to Critical Infrastructure
In recent years, the landscape of cyber threats has evolved dramatically, with the emergence of AI-powered attacks posing new and formidable challenges. MIT security researchers have made significant strides in simulating cyber-attacks capable of triggering physical damage to vital infrastructure,…
Hackers simulating cyber-attacks in labs
It’s quite alarming to hear about the advancements in cyber-attacks, especially those fueled by AI and capable of causing physical damage to critical infrastructure like dams. The intersection of technology and security has always been a double-edged sword, offering both…
8 Tips To Protect Your Organization in the Evolving SaaS Landscape
[by Yoav Kalati] Today, we’re seeing the growing dependence on and adoption of Software as a Service (SaaS) tools by businesses and organizations. However, this increased reliance also has posed challenges on the security front, as threat actors try to…
Healthcare Software Security: Standards and Challenges
Digital healthcare has been developing rapidly during the last decade: the enactment of the American Reinvestment and Recovery Act (ARRA) in 2009 drove the majority of healthcare organizations in the US to adopt the EHR system, the COVID-19 pandemic boosted…
How SASE-based XDR Delivers Better Threat Detection Performance
[By Demetris Booth, Product Manager, Cato Networks] The cybersecurity market is brimming with point solutions. Each solution is designed to address a specific risk, a specific security use case and a specific attack vector. This approach is no longer sustainable…
France concerned about cyber attacks on electric grids for Summer Olympics 2024
Scheduled to take place from July to August this year in Paris, France, the 2024 Summer Olympics are set to be a grand event spread across various stadiums throughout Europe. However, concerns have been raised by Stephane Sejourne, France’s Foreign…
LockBit Ransomware gang endorses Donald Trump as next US President
The LockBit Ransomware gang, previously subdued by law enforcement agencies worldwide, has resurfaced with its trademark double extortion tactics, targeting businesses with file-encrypting malware attacks. Interestingly, the group’s leader, ‘LockbitSupp,’ has publicly endorsed Donald Trump as the next US President,…
The Resounding Boom of Cybersecurity: Understanding Its Ever-Expanding Industry
In today’s digital landscape, cybersecurity has emerged as not just a necessity but a thriving industry. With cyber threats becoming more sophisticated and pervasive, the demand for robust security measures has skyrocketed, propelling cybersecurity into a realm of unprecedented growth…
Data security concerns with Chinese cars and Ban on mass data being imported to China
Data security concerns with Chinese and other nation cars The security of data in cars from China and other nations has become a focal point of concern, prompting action from the United States government. President Joe Biden has signed an…
Ransomware infection reach extends to Data Backups
For years, IT experts have emphasized the importance of maintaining backups for data and applications, highlighting their crucial role in swiftly recovering from cyber-attacks. Indeed, having such backup systems in place can preserve data continuity during unexpected incidents, thereby minimizing…
New Ransomware gang steals about 200GB of data from Game Developer
A newly emerging ransomware group named Mogilevich has purportedly breached the servers of Epic Games, an American game developer, making off with approximately 200GB of data. Reports indicate that the cybercriminal outfit has set a deadline of March 4th for…
Navigating Data Security Concerns in Cloud Migration: Strategies and Best Practices
In recent years, cloud migration has emerged as a pivotal strategy for organizations seeking to modernize their IT infrastructure, enhance scalability, and streamline operations. While the benefits of cloud adoption are undeniable, the process of transitioning sensitive data to the…
Russia develops an AI Cyber Threat Tool to put a jolt in US democracy
Amidst growing concerns over cyber warfare, reports have surfaced regarding Russia’s advancements in artificial intelligence (AI) for spreading misinformation. Under the leadership of Vladimir Putin, Russia has allegedly developed sophisticated AI-based cyber tools aimed at manipulating news narratives, with potential…
IBM offers AI enabled ransomware resilience data storage solutions
Amidst the prevailing wave of Artificial Intelligence technology, IBM has aligned itself with the trend by introducing an AI-driven ransomware resilience solution for data storage. This innovative offering is poised to tackle the diverse array of file-encrypting malware prevalent in…
Trending Cyber Attack news headlines on Google
APT29 moves from Government infrastructure towards Cloud Service Providers APT29, also known as Midnight Blizard or Cozy Bear and associated with Russian Intelligence, appears to have altered its approach from targeting government infrastructure to focusing on cloud service providers. This…
FTC slaps Avast with $16.5m penalty for selling browser data
It’s indeed concerning when cybersecurity solutions meant to protect users’ privacy end up compromising it instead. The case of AVAST highlights the importance of transparency and accountability in the handling of user data. Users trust these companies to safeguard their…
Cybersecurity fears trigger Cloud Repatriation
It’s interesting to see the shift in attitudes towards cloud adoption, especially considering the initial push towards it from figures like former President Trump. The concept of cloud repatriation, where organizations bring their workloads back in-house from third-party cloud services,…
Planning for Digital Afterlife: Retrieving Data from a Deceased User’s Google Account
Introduction: In our increasingly digital world, managing online accounts and preserving digital legacies has become a critical consideration. When someone passes away, accessing and retrieving data from their Google account can be a sensitive and complex process. This guide aims…
2024 is Here: Will This Be the Year We Get Passwords Right?
[By Darren James, Senior Product Manager, Outpost24] Humans have made unbelievable advancements in science and technology that have stretched the imagination and changed society forever. But one seemingly mundane, albeit crucial, piece of wisdom continues to elude mankind – proper…
Repeat Ransomware attacks on 78% of victims who pay
In November 2019, the FBI and US-CERT jointly issued a statement advising against ransom payments to hackers, asserting that such payments could embolden cybercriminals and exacerbate cybercrime. They urged victims to instead seek guidance from law enforcement or forensic experts.…
How to Properly Handle Cyber Security Incident Management
[By Chris Debigh-White, Chief Security Officer at Next DLP] The majority of security experts adhere to the “assume breach” paradigm, which recognizes the possibility, if not the inevitability, of an attacker gaining access to an organization. This breach could occur through…
Cyber Attack news headlines trending on Google
Federal Trade Commission Clears X (formerly Twitter) of Data Security Violations Following an investigation into the server operations of X, previously known as Twitter, the Federal Trade Commission (FTC) has announced that Elon Musk’s company has upheld user privacy and…
Top 7 best Practices for Mobile Security in a BYOD Environment
In the modern workplace, the Bring Your Own Device (BYOD) trend has become increasingly prevalent, revolutionizing how businesses operate and employees collaborate. While BYOD offers flexibility and convenience, it also introduces significant security challenges, particularly in the realm of mobile…
Toshiba and Orange offer quantum secure data transmission with utmost security
Toshiba, the Japanese electronics giant, and Orange, a major telecom company, have unveiled breakthroughs in quantum secure data transmission. Their innovation shields information transmitted over fiber optic networks from cyber threats of all kinds. The advancement relies on Quantum Key…
Air Canada AI Chatbot spreads misinformation only to fetch hefty legal penalty
When attempting to book a flight ticket on an air travel website, it’s common to encounter a chatbot designed to assist in completing the transaction. However, what happens if this chatbot provides misinformation that could result in costly consequences? This…
Top 5 Cybersecurity Risks Facing Businesses Today
The digital era: what a time to be alive! It’s easier to stay in contact from a distance, make financial transactions, shop for necessities (or luxuries), and conduct business. Lucky us, right? The answer is undoubtedly yes, with an and……