Microsoft is actively engaged in the development of a glass-based data storage medium slated for integration into its data centers that facilitate Azure Cloud services. This innovative ceramics-based storage solution is specifically designed for archival purposes and is touted to…
Tag: Cybersecurity Insiders
Twitter fired its Information Security head for cutting budget on data security and privacy
Elon Musk has been making headlines recently, not only for his contentious remarks against his company’s investors but also for the abrupt dismissal of his Information Security head. The focus of the controversy lies in allegations made by Alan Rosa,…
Guidelines for Secure AI System Development
In an era where artificial intelligence (AI) plays an increasingly pivotal role across various industries, ensuring the security of AI systems has become a paramount concern. As AI technology continues to advance, developers and organizations must prioritize robust security measures…
Star Blizzard Cyber Attacks on UK
Star Blizzard, a hacking group allegedly sponsored by Russia’s intelligence agency Centre 18, has recently made headlines for engaging in long-term espionage on prominent figures in the United Kingdom, including top politicians, journalists, and bureaucrats. The discovery of this covert…
Getting Ahead of the Attack
[By Matt Wilson, vice president of product management, Netography] Being proactive is always good advice, but being proactive and being prepared when it comes to cybersecurity is a must. With threat actors maturing and constantly changing their methods, security teams…
Log4Shell: A Persistent Threat to Cybersecurity – Two Years On
[By Mike Walters, President and co-founder of Action1] Two years have passed since the cybersecurity world was rocked by the discovery of Log4Shell, a critical vulnerability in the Log4j library. First discovered on December 9, 2021, this legendary flaw exposed…
Star Blizzard launched Cyber Attacks on UK since years
Star Blizzard, a hacking group allegedly sponsored by Russia’s intelligence agency Centre 18, has recently made headlines for engaging in long-term espionage on prominent figures in the United Kingdom, including top politicians, journalists, and bureaucrats. The discovery of this covert…
Why Infostealers are Stealing the Security Spotlight
The cybersecurity landscape is constantly evolving, with bad actors finding new and creative ways to exploit weaknesses. The threat from Malware continues to escalate with infostealers, an increasingly popular variant. Research found that 24% of malware is now infostealers, and…
Sierra Wireless routers are vulnerable to Cyber Attacks
Sierra Wireless, a Canadian company specializing in industrial web connectivity solutions, has recently come under scrutiny due to security concerns. Security experts have identified approximately 21 vulnerabilities in the software of its routers, such as OpenDNS and TinyXML. These vulnerabilities…
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program
[By Perry Carpenter, chief evangelist and security officer at KnowBe4] The threat landscape is evolving with new attack vectors and cyber threats surfacing almost daily. Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that…
Cyber Threat emerges out of Apple iOS 17 new NameDrop Feature
Apple’s recent update to iOS 17 introduced a new feature called NameDrop, enhancing data transfer capabilities for iPhone and Apple Watch users. This update allows seamless sharing of various files, including contacts, messages, photos, and videos. Despite its convenience, security…
Cyber and Physical Security Are Different, But They Must Work Together
[By Blake Benson, Senior Director – Industrial Cybersecurity Practice at ABS Group] America’s critical infrastructure faces more diverse threats than ever before. The rapid digitalization of many sectors and the relatively analog operational environments that exist in others have led…
UK to block all Social Media Scams
Starting May 2024, residents of the United Kingdom can breathe a sigh of relief, as social media platforms operating in the country have collectively committed to combating a range of scams on their respective networks. This includes everything from phishing…
Securing the Cloud: Strategies for CSPs to Mitigate Malware Hosting Risks
In recent years, the prevalence of cloud computing has revolutionized the way businesses operate, offering scalability, flexibility, and cost-efficiency. However, this technological shift has also attracted the attention of cyber-criminals who exploit cloud environments for hosting malware. Cloud Service Providers…
Nine 9 tips before putting your Android Smartphone or Apple iPhone for resale
Many Americans are likely considering selling their old smartphones to upgrade to the latest models released by OEMs, featuring innovative features and new operating systems. However, before selling your smartphone to a friend or a company, it’s crucial to take…
Thinking about a Career in Cloud Security? Follow this Path
As more critical data and assets move to the cloud, they’ve become prime targets for cybercriminals. Organizations worldwide need cloud security professionals who understand the evolving complexities to identify and mitigate security risks. Complicating matters, most are operating under a…
Microsoft issues alert on Cactus Ransomware spreading through DanaBOT Ransomware
Microsoft, the prominent American technology giant, has issued a cautionary alert regarding the proliferation of Cactus ransomware attacks disguised as the Danabot malvertising campaign. The primary goal of this malicious activity is to pilfer sensitive information, including credentials, or serve…
Britain Nuclear site Sellafield experiences malware cyber attack
Reports confirm that Sellafield, a prominent nuclear site, has fallen victim to a recent malware attack, with initial investigations suggesting the infiltration of malicious software dating as far back as 2015. Cybersecurity experts are actively engaged in probing the incident,…
Ransomware news currently trending on Google
1.) A cloud computing firm named ‘Trellance‘ recently fell victim to hackers spreading ransomware, causing disruptions and outages for approximately 60 credit unions in the United States. The National Credit Union Administration (NCUA), responsible for overseeing technology related to federal…
Understanding Mobile Network Hacking: Risks, Methods, and Safeguarding Measures
In an era dominated by mobile connectivity, the security of mobile networks has become a critical concern. Mobile network hacking refers to unauthorized access and manipulation of mobile communication systems, posing significant risks to individuals and organizations alike. This article…
Identifying Insider Threats: Addressing the Top Five Insider Threat Indicators
[By John Stringer, Head of Product, Next] Cybersecurity teams work extensively to keep external attackers out of their organization’s IT environment, but insider threats present a different, equally as difficult, challenge. Identifying insider threats is growing increasingly complex, and, as…
Getting your organisation post-quantum ready
While quantum computing is still very much in its early stages, it’s important that companies are already thinking about this evolving technology – and more importantly implementing and stress testing much needed solutions suitable for a post-quantum world. In this…
Japan Aerospace Agency hit by ransomware attacks
Japan Aerospace Exploration Agency, commonly referred to as JAXA, recently fell victim to a cyber attack believed to be a ransomware variant. While an official confirmation on the nature of the cyber incident has been issued, specific details regarding the…
Google and Meta complain about China’s misbehavior online
In a reminiscent scene of a child complaining to their parents about a friend or schoolmate’s behavior, both Meta and Google have recently voiced their concerns over China’s online conduct. Meta, the owner of the popular social media network, released…
Exploring Secure Alternatives to Traditional Passwords
In an era dominated by digital interactions, the need for robust online security measures is more crucial than ever. Passwords, once the primary guardians of our digital realms, are facing increasing vulnerabilities, prompting a search for more secure alternatives. Let’s…
How mobile network automation will drive success for operators
Mobile Network Operators (MNOs) are under huge pressure from enterprises and consumers to deliver fast and efficient services – but meeting these expectations in the face of exploding data demands is not an easy task. Fortunately, automation has emerged as…
Unlocking the Full Potential of Unified SASE: An Interview with HPE’s Chris Hines
As organizations pivot toward more distributed and fragmented models of work, cybersecurity measures must adapt to keep pace with the evolving threat landscape and expanding attack surface. In an in-depth interview with Chris Hines, VP of Strategy and Global Marketing…
Tips to Get Certified in Cybersecurity in 30 Days
Cybersecurity is a constantly expanding field. At the same time, there simply aren’t enough qualified people to fill the available jobs out there. Research shows the world needs an influx of 4 million more cybersecurity professionals to meet demand. Now’s…
WEBINAR: Vulnerability Risk Management – The Lynchpin of Proactive Security
Join our friends at Forrester and Brinqa on Dec 5 for a live webinar to learn how vulnerability risk management is the foundation for proactive security [register here] At this virtual event, you will learn how companies like Nestle, GitHub,…
Data Breach leaks employee data of Dollar Tree and Family Dollar
A technology service provider named ‘Zeroed-In’ Technologies fell victim to a cyber attack, resulting in the exposure of employee information from the Dollar Tree and Family Dollar stores chain. The breach is estimated to have granted unauthorized access to sensitive…
Why it’s time for biometric payment cards to hit the mainstream
Have you ever found yourself in a situation where making a payment became an awkward ordeal? Perhaps you’ve caused a hold up at the tube barriers while waiting for your mobile device to recognise your fingerprint, or maybe you’ve drawn…
CrowdStrike CEO suggests to use AI to curb ransomware spread
George Kurtz, the CEO of Crowd-Strike, has proposed a strategy for leveraging Artificial Intelligence (AI) to combat ransomware attacks. During an interview with CNBC’s Jim Cramer, Kurtz emphasized that AI could play a crucial role in identifying novel ransomware variants…
What is Advanced Threat Protection in Office 365 and How Does it Work?
Cyber threats are becoming more common by the day. However, we live in an era where digital threats are becoming increasingly sophisticated. When that’s the case, the importance of robust cybersecurity measures cannot be overstated. Office 365 Advanced Threat Protection…
Reflecting on Generative AI One-Year Post ChatGPT Launch
On November 30, 2022, the technology world as we knew it changed with the launch of ChatGPT. In honor of the one-year anniversary of its debut, the below experts shared their perspectives on the impact the technology has had on…
Stop Expecting Developers to Write Secure Code
[By Eitan Worcel, CEO and co-founder, Mobb.ai] While it is expected that organizations do as much as possible to secure their software applications, expecting developers to write secure code only sets both up for failure. The root of the issue…
Ransomware attack on Law Firm can halt its M&A
The Allen & Overy law firm, currently engaged in a Merger and Acquisition deal with Shearman & Sterling, has fallen prey to the LockBit ransomware group, a notorious faction known for spreading file-encrypting malware. Despite assurances from trade analysts that…
Why we need to make passwords a thing of the past
Alex Laurie, SVP Global Sales Engineering at Ping Identity Passwords have been with us for decades. The problem is that people have far too many to remember – does this one have a capital letter, a number or a special…
CompTIA achieves place in National Cyber Security Hall of Fame
The Computing Technology Industry Association, better known as CompTIA, has earned a distinguished place in the National Cyber Security Hall (NCSH) of Fame, recognizing its pivotal role in empowering IT professionals to unlock their potential in the realms of security…
What is Simulated Phishing
Simulated Phishing refers to the practice of creating fake or simulated phishing attacks to test and assess the vulnerability of individuals or organizations to phishing threats. Phishing is a type of cyber-attack where malicious actors attempt to deceive individuals into…
The Evolution of AI in Cybersecurity
Nima Baiati, Executive Director & GM, Commercial Cybersecurity Solutions, Lenovo Perhaps not since the invention of the printing press has any technology been poised to revolutionize every aspect of life and business, at least from a promise standpoint. The potential…
Ardent Health Services hit by ransomware
Numerous hospitals affiliated with Ardent Health Services have fallen victim to a ransomware variant, forcing patients and staff to reschedule appointments or redirect those in need to alternative medical facilities. The affected healthcare institutions include Hillcrest Healthcare Systems in Oklahoma,…
Iran launches cyber attack on water authority in the United States
Iran-backed hackers are alleged to have successfully breached the IT infrastructure serving the Water Authority of Pennsylvania in the United States. Disturbing reports indicate that their objective was to disrupt the water supply, potentially causing chaos and panic among the…
GE servers hacked n DARPA Military Info Leaked
General Electric, commonly referred to as GE, a multinational corporation engaged in the fields of renewable energy, aerospace, and power, has fallen prey to a cyber attack resulting in the leakage of sensitive information related to DARPA Military operations. The…
Topics to study for job in Artificial Intelligence
To prepare for a job in artificial intelligence (AI), it’s essential to develop a strong foundation in various relevant topics. Here’s a list of key areas you should consider studying: 1.Machine Learning (ML): Supervised learning, Unsupervised learning, Reinforcement learning, Deep…
Windows 11 new update bolsters cybersecurity of healthcare
Windows 11, Microsoft’s latest operating system, has recently introduced an update aimed at enhancing the protection of healthcare IT environments and safeguarding patient data from evolving cyber threats. While contemporary firewalls, anti-malware tools, and threat monitoring solutions are adept at…
Taj Hotel Data Breach details
Taj Hotels, a subsidiary of Indian Hotels Company Ltd (IHCL), recently fell victim to a cyber-attack that resulted in the compromise of personal details belonging to more than 1.5 million customers. The leaked information encompasses a range of sensitive data,…
Report Phishing and Spam messages on Google in this way
The use of smartphones has surged over the past five years, attributed to the convenience and services they offer to users. Whether it’s booking a hotel or ordering food, app-powered smartphones are a technological marvel in the hands of enthusiasts.…
Demystifying Data Protection Design: A Comprehensive Overview
In an era dominated by digital advancements and an ever-growing reliance on technology, the concept of data protection has become paramount. As businesses and individuals generate and handle vast amounts of sensitive information, the need for robust data protection design…
Two Insurance companies come under the influence of Ransomware Attacks
Sabre Insurance, a London-based company specializing in motor insurance services, fell victim to a ransomware attack that resulted in a breach of information and data theft by hackers. Although the company asserts that the accessed information was non-critical and related…
FBI and CISA warn against Scattered Spider triggered cyber attacks
Law enforcement agencies in North America have issued a warning regarding the Scattered Spider cyber-attacks, citing their adoption of aggressive tactics, including the targeting of victims with violence. Notably, this English-speaking group has aligned itself with ALPHV and BlackCat, leading…
Australia runs cybersecurity health check on all gov websites and infrastructure
The Australian government has initiated rigorous security measures to safeguard its IT infrastructure from state-sponsored cyber-attacks. As part of this initiative, the Australian Signals Directorate has conducted two cyber security threat hunts on government networks since December of last year,…
Just beware of these 5 Black Friday or thanksgiving Cyber Scams
In a recent survey conducted by Lookout, it has been found that more than 3 out of 5 individuals are expected to take advantage of Black Friday and Cyber Monday deals through their mobile phones this year. However, security experts…
Leveraging Hybrid Cloud Solutions for Enhanced Cybersecurity in Healthcare
In the ever-evolving landscape of healthcare, where the digitization of patient records and sensitive data is paramount, the need for robust cybersecurity measures has become more critical than ever. One innovative approach gaining momentum in the healthcare sector is the…
SOLUTION REVIEW: Enzoic for Active Directory
Compromised credentials stand as the predominant cause of data breaches, underscoring the urgency for organizations to bolster their defenses. It’s crucial to acknowledge that, often, the only barrier separating an attacker from an organization’s most precious resources is the strength…
Latest Buzz in Cybersecurity: Trending Headlines on Google
Virginia has emerged as the top state with the highest concern for cyber threats, with approximately 655 respondents out of 100,000 residents actively searching for keywords related to cybersecurity, according to data compiled by NinjaOne. Following Virginia, Maryland, Massachusetts, Georgia,…
Rhysida Ransomware demands 20 BTC from British Library
Last month, the British Library Computer Network fell victim to a ransomware attack, purportedly carried out by the Rhysida Ransomware, a newly identified malware variant. The perpetrators are now demanding a ransom of 20 bitcoins to decrypt the compromised database…
What to do if the phone is hacked or becomes espionage target
When you discover that your device has been compromised, it’s important not to panic. Such incidents can happen to anyone, and taking swift action within a couple of hours can help mitigate potential risks to your personal information. The first…
Navigating the Waters of AI: Safeguarding Against Data Security Risks
In the era of rapid technological advancement, artificial intelligence (AI) has emerged as a powerful tool with transformative potential across various industries. While AI brings unprecedented opportunities, it also introduces new challenges, particularly in the realm of data security. As…
Now a Stock Market business hires hackers
Six Group, a technology firm responsible for securing the operations of Spanish and Swiss Bourses, is actively recruiting hackers to counter sophisticated attempts to breach its network. The motivation behind hiring these cybersecurity experts is to gain insights into the…
Five Cybersecurity Predictions for 2024
“Over the past year, we’ve witnessed significant developments in cybersecurity, including the emergence of generative AI and its ability to enhance organizations’ threat intelligence efforts, and the rise of Threat Exposure Management, a program of consolidation to identify and mitigate…
Addressing Legacy System Patching Neglect
By Joao Correia The persistent neglect of patching legacy systems has long affected critical infrastructure as well as nearly all major industries. At a time when the cyberthreat environment is teeming with new malware variants, cybercriminal groups and data-hungry hackers,…
To Navigate Cyberattacks Effectively, Start with Empathy
By Ric Opal, Principal and National Leader of IT Solutions and Strategic Partnerships at BDO Digital From username, password, and credit card hacking to other forms of authentication attacks, Microsoft blocked, on average, 4,000 identity authentication threats every second in…
E-commerce Security in the Cloud: Safeguarding Data in the Holiday Season
By Dan Benjamin, CEO and Co-Founder, Dig Security The holiday sales season is the most important time of year for e-commerce retailers, representing a time of heightened consumer activity and potential revenue growth. Retailers are forced to maintain security while balancing the consumer…
A new era of age verification
There are many scenarios where we might need to prove our age – from ordering an alcoholic drink in a bar, to applying for a job, buying medication, or accessing age restricted content online. And while most people currently use…
Blacksuit Ransomware linked to Royal Ransomware
As per an advisory from the FBI and US-CISA, a forthcoming ransomware variant is set to enter the cybersecurity landscape, marking itself as a rebrand or offshoot of the Royal Ransomware gang, notorious for purportedly amassing around $275 million in…
Cyber Security news headlines trending on Google
Morgan Stanley Agrees to $6.5 Million Settlement with Six States Over Data Breach Global financial services giant Morgan Stanley has reached a settlement of $6.5 million with six North American states for its failure to safeguard customer data, resulting in…
The Cyber Resilient CEO: Navigating the Digital Landscape with Vigilance
In an era dominated by rapid technological advancements and an ever-evolving digital landscape, the role of a CEO has transcended beyond traditional business acumen. Today, a new breed of leaders is emerging – the cyber resilient CEO. But what exactly…
How to Pitch Cybersecurity Packages
By Brandi Crown, Director of Sales at Syncro If you have a tool that has proven to improve threat protection for your clients, but you don’t know how to sell it effectively, it’s a lose-lose for everyone. Your client misses…
An Inside Look at Ransomware’s Record-Breaking Pace in 2023
Ryan Bell, Threat Intel Manager, Corvus Insurance There is still more than one month left in the books for 2023, and it’s safe to say that once we flip the calendar to January, we will have also closed the books…
FBI and CISA issues alert against Rhysida Ransomware Gang
Rhysida Ransomware, operating since December 2022, has garnered attention from the US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI). Both agencies have issued warnings about this ransomware, noting its unique capability to delete itself…
ALPHV Ransomware gang files SEC Complaint against a victim
In a groundbreaking development in the realm of ransomware, ALPHV, also known as BlackCAT, has taken an unprecedented step by filing a complaint with the Security and Exchange Commission (SEC) against a victim who failed to adhere to the stipulated…
AI In Cybersecurity: Exploring the Opportunities and Dangers
By Dr. Madhu Shashanka, Chief Data Scientist and Co-Founder, Concentric AI If you’ve been keeping with the news surrounding generative artificial intelligence (AI), you’re probably in one of two camps – optimistic or concerned. In the rapidly evolving world of…
UK labels AI Tools as a cyber threat to National Elections
Britain has identified the continued use of AI tools as a significant cyber threat to the upcoming national elections slated for January 2025. Emphasizing the increasing difficulty for security experts to track and neutralize these threats, particularly in the context…
Stream Security Takes on CloudSecOps
The cybersecurity industry has been rapidly transforming for well over a decade. With threat actors rapidly finding unique ways to expose vulnerabilities, organizations are constantly seeking the latest technology to protect their proprietary information, such as Intrusion Detection Systems (IDS)…
LockBit hiring young hackers to launch ransomware attacks
LockBit, a notorious ransomware gang, has consistently targeted major corporations, with victims ranging from Boeing and DP World to the Industrial and Commercial Bank of China and Allen and Overy. Recent revelations suggest that the hackers achieved their success by…
Navigating Cloud Security Compliance: Understanding FedRAMP, StateRAMP, and Key Differences
In the ever-evolving landscape of cloud computing, ensuring robust security measures is paramount. Federal and state governments, along with private enterprises, adhere to specific security compliance frameworks to safeguard sensitive data. This article will delve into the differences between FedRAMP,…
India to make CyberShield mandatory for Vehicles
India has emerged as a trailblazer in proactively addressing the looming threat of cyber attacks on domestically manufactured vehicles. This initiative aligns with guidelines established by the United Nations Economic Commission for Europe World Forum for Harmonization of Vehicle Regulation,…
PlexTrac Establishes UK and European Operations
Dedicated Organization Established to Deliver the Highest Level of Technical and Business Support to Existing Customers, Prospects and Partners LONDON, England, November 2, 2023 (Newswire.com) – PlexTrac, a pioneer in streamlining offensive security and pentest planning, reporting, and findings delivery, today…
Ransomware attack on Huber Heights drives it into Emergency
Huber Heights, a picturesque city in Ohio, found itself in a state of emergency due to a sophisticated ransomware attack that targeted several of its departments. City Manager Rick Dzik assured residents that efforts were underway to resolve the issue…
How Financial Services Firms Can Use Application Security Posture Management (ASPM) to Save Costs and Fill Cloud Security Posture Management (CSPM) Coverage Gaps
By Anna Tang, Information Security Officer, Data Theorem In recent years, financial services organizations have increasingly moved their applications and infrastructure to the cloud to take advantage of its scalability, flexibility, and cost-effectiveness. However, this shift to the cloud has…
Generative AI: Bringing Cybersecurity Readiness to the Broader Market
By Benjamin Preminger, Senior Product Manager, Cybersixgill “You can’t get good help nowadays.” The adage is true for many professions, but exceedingly so for cybersecurity. While cyber-attacks continue to grow in quantity and sophistication each year, most organizations are ill-prepared to defend…
A Guide to Handling SAP Security Breaches
By Christoph Nagy, SecurityBridge So your SAP system has been breached. While this is not an unusual occurrence, it’s still a serious issue that needs your immediate attention. Since SAP is one of the most widely used systems by organizations…
Eight 8 WhatsApp message links that you should never click on
Staying active on social media is a popular trend, and WhatsApp is one of the prominent platforms facilitating connections with both businesses and loved ones. However, security experts warn that, like any online service, this Facebook-owned subsidiary is susceptible to…
Employment Scams On The Rise: What Can HR Do To Mitigate Them?
Ani Banerjee, Chief Human Resources Officer, KnowBe4 Bad news. Your organization just announced a major restructuring, making your role “redundant”. You update your LinkedIn profile, using the #OpenToWork hashtag, and announce to prospective recruiters that you’re on the market, actively searching…
Cybersecurity horror stories and how to avoid them
By Andy Syrewicze, Microsoft MVP and Technical Evangelist, Hornetsecurity 2023 has seen a host of malicious cyber-attacks targeting a range of organisations from police forces to healthcare providers. The threat landscape has transformed drastically across the course of my career,…
DP World Cyber Attack puts Australia on High Alert
Over the recent weekend, DP World Australia, a prominent maritime freight operator, fell victim to a sophisticated digital attack, prompting swift action from authorities. In response to the breach, access to the corporate network was temporarily halted, and operations at…
Enhancing Ransomware Defense through Micro-Segmentation of Networks
In an era where cyber threats continue to evolve in sophistication, organizations are increasingly turning to advanced security measures to protect their digital assets. One such strategy gaining prominence is micro-segmentation of networks, a powerful approach that proves invaluable in…
It’s Never Too Soon to Begin Thinking About Your 2024 Cybersecurity Journey
John Siegel, Director of Strategy, Field CTO, Axis Security Was it me, or did 2023 roll by fast? It feels like it was a blur to me. The end of the year is here and it’s time to pause, take stock, and…
Cyber Attack news headlines trending on Google
The Washington State Transportation website and its mobile app experienced a disruption due to a sophisticated cyber attack earlier this week. According to information shared on the X, WSDOT ferry vessel watch social media platform, both online freight services and…
What is the Diamond Model of Intrusion Analysis – And How to Use the Framework
The Diamond Model of Intrusion Analysis is a framework used in cybersecurity to analyze and understand cyber threats and intrusion events. It provides a structured way to break down and analyze cyber incidents, helping security professionals and incident responders to…
How the AI era has fundamentally altered the cyberthreat landscape
By Matt Lindley, COO and CISO at NINJIO The AI mania over the past year has been illuminating in many ways. Despite the emergence of exciting new technology such as generative AI tools that can produce a vast library of…
Cyber Attack on US Bank forces it to transit data via USB Sticks
In a world plagued by numerous cyberattacks and their devastating aftermath, a recent incident involving the Industrial & Commercial Bank of China (ICBC) has drawn significant attention. ICBC, one of the world’s largest banks, was forced to resort to a…
What is a diamond model of Intrusion Analysis
The Diamond Model of Intrusion Analysis is a framework used in cybersecurity to analyze and understand cyber threats and intrusion events. It provides a structured way to break down and analyze cyber incidents, helping security professionals and incident responders to…
Why you need ZTNA with Desktops-as-a-Service
By Karen Gondoly, CEO of Leostream As the world increasingly works remotely, Desktops as a Service (DaaS) are becoming ubiquitous in many industries. Remote workers need access to cloud and on-premise data and applications, and delivering that access in a…
Eight Ways to Bolster Your Cybersecurity Resources Without Blowing Your Budget
By Karen Lambrechts, Lansweeper IT security breaches are becoming more frequent and costly. According to IBM Security’s Cost of a Data Breach Report 2023 UK organisations shell out an average of £3.4m for data breach incidents. There isn’t a CISO…
Is Microsoft ChatGPT grappling with DDoS Cyber Attack
In recent days, Microsoft’s generative AI tool, ChatGPT, has been experiencing connectivity problems. The official message on the website indicates that their servers are operating at full capacity. However, an article published by Bloomberg suggests that the technology giant’s AI…
How can a CEO or a CTO lose their jobs on ransomware attacks
In accordance with the newly introduced federal guidelines, the responsibility for a company facing a ransomware attack is now placed squarely on the shoulders of its CTO or CEO. Legal repercussions may be initiated against the targeted business if it…
Ten 10 ways Senior Citizens and Disabled can stay cyber safe and secure online
Online banking and services help disabled and senior citizens gain access to valuable services from the comfort of their homes, that otherwise can only be availed on a physical note. However, with the increase in digitalization, hackers are seeing such…
Can a Brute Force Attack Be Reversed?
Brute force attacks are a common and often successful method employed by hackers to gain unauthorized access to various systems, accounts, or data by systematically trying all possible combinations of passwords or encryption keys. While it may seem like the…
Fresh Optus Australia server disruption not caused by a Cyber Attack
Optus, the Australian counterpart of Singapore Telecommunications, faced a significant disruption on Wednesday, leading to widespread service outages affecting millions of customers. While some initially speculated that the outage was the result of a national emergency or a state-sponsored attack,…