Tag: Information Security Buzz

5 Emerging Malware Variants You Must Be Aware Of

The cybersecurity landscape is marked by sophisticated malware strains designed to harvest sensitive data, get a foothold on company networks, and generally wreak havoc. A new report from ReliaQuest examines five malware variants that have recently impacted the threat landscape…

Ransomware Gangs Introduce New EDR-Killing Tool

Sophos researchers have uncovered a new tool, EDRKillShifter, that malicious actors are using to target endpoint detection and response (EDR) systems. The discovery came after an unsuccessful ransomware attack in May. The threat actors deployed the tool to disable endpoint…

Taming Identity Sprawl With a Least Privilege Approach

Remember the Hydra, the multi-headed creature from Greek mythology? Warriors attempting to slay the beast faced a seemingly impossible challenge: when they cut off one head, multiple heads re-emerged. Security teams entrusted with Identity and Access Management (IAM) can relate…

China-linked Attackers Target Russian Govt Entities

Researchers from Kaspersky have detected a series of ongoing targeted cyberattacks on dozens of computers at Russian government entities and IT organizations. The bad actors infected devices via phishing emails with malicious shortcut attachments. These shortcuts were used to deliver…

Russian Sentenced to 40 Months for Selling Stolen Data on Dark Web

A Moscow-based Russian national, Georgy Kavzharadze, has been sentenced to 40 months in federal prison for selling stolen financial information on the dark web marketplace known as Slilpp. The US Attorney’s Office for the District of Columbia announced that Kavzharadze,…

Malware Loaders Dominate Cybersecurity Threats in 2024

Malware loaders are a significant threat in the cybersecurity landscape, with nearly 40% of all malware observed in critical security incidents involving these specialized tools. Among the most prevalent loaders are “SocGholish,” “GootLoader,” and “Raspberry Robin,” which have been frequently…

NIST Debuts First Set of Finalized Post-Quantum Encryption Standards

The US Department of Commerce’s National Institute of Standards and Technology (NIST) has officially released its first set of finalized encryption standards designed to withstand attacks from quantum computers. These post-quantum encryption standards are expected to secure a wide array…

Email Security Risk Remains Alarmingly High

A staggering 94% of companies have fallen victim to phishing attacks over the last year, while 91% experienced data loss or exfiltration incidents. It’s not surprising, then, that 95% of cybersecurity leaders are increasingly stressed about email security, particularly phishing…

Six Reasons Healthcare Organizations Need Robust Cybersecurity

Medical organizations must implement robust cybersecurity solutions due to the sensitivity of the data they handle and the increasing frequency of cyberattacks. As these organizations rely more heavily on technology for storing and managing patient data in the digital era,…

The Importance of APIs/API Security in Financial Services

In the evolving financial services landscape, Application Programming Interfaces (APIs) have become fundamental tools for facilitating seamless digital transactions and interactions. However, as the reliance on these technologies grows, so does the need for stringent API security. Ensuring the safety…

Passwordless Prescription: The Cure for Healthcare Cybersecurity

The healthcare industry is poised for a cybersecurity transformation, with passwordless authentication at the forefront. Utilizing passkeys and biometrics improves user experience and significantly strengthens data security against contemporary threats such as credential stuffing and MFA fatigue. So says Phil…

Vectra AI Expands XDR Platform

Vectra AI, a provider of AI-driven Extended Detection and Response (XDR) solutions, has expanded its Vectra AI Platform, enhancing its ability to provide Security Operations Center (SOC) teams with a real-time view of their active posture. This expansion leverages the…

Optimizing AWS GuardDuty for Enhanced Security Monitoring

Approximately 2.38 million customers worldwide use Amazon Web Services (AWS) to host and power their cloud-based business assets, per a recent market report. If you’re reading this, you’re probably one of them. With officially over half (50.1%) of the market…

Police Recover Over USD 40 Million from International Email Scam

A global stop-payment mechanism developed by INTERPOL has enabled Singapore authorities to recover over USD 40 million from a business email compromise (BEC) scam, marking their largest-ever recovery of fraudulently obtained funds. On 23 July 2024, a commodity firm based…

Ransomware Attack Targets Grand Palais, Paris

French cybercrime police are investigating a ransomware attack on the Grand Palais Exhibition Hall in Paris, a venue for Olympic events such as fencing and Taekwondo. According to Reuters, the central computer system of the Grand Palais was targeted, but…

Tech Contractor Exposes Data of 4.6 Million US Voters

A US technology contractor has inadvertently exposed the personal data of 4.6 million voters and election documents from multiple counties in Illinois, sparking significant concerns over election security and voter privacy. The databases, managed by Platinum Technology Resource, were found…

The Illusion of Reputational Damage

In June, the HIPAA Journal reported a story that seems to be the trifecta of insider threat, third party risk, and medical technology risk. A terminated subcontractor employee of a medical transcription service stole at least one million patient records.…

Proficio Unveils ProBAS Breach and Attack Simulation Service

Proficio, a Managed Detection and Response (MDR) provider, has rolled out its ProBAS Breach and Attack Simulation service. The solution “rigorously” tests businesses’ security defenses, to ensure they can prevent compromise events and detect attacks throughout the entire threat detection and…

LianSpy Spyware ‘LianSpy’ Targets Android Users

Security researchers at Kaspersky have uncovered a new Android spyware campaign called LianSpy, which has been used for cyberespionage against targeted Android device users in Russia. The malware, dubbed “LianSpy,” has been in operation since July 2021, quietly harvesting sensitive…

Wristband Releases Public Beta of its B2B Authentication Platform

Wristband, a developer-first authentication platform designed for B2B SaaS, has released the public beta launch of its B2B authentication platform. Jim Verducci, CEO of Wristband, says building robust B2B authentication in-house is a complex and time-consuming process that can take…

Dark Angels gang scores a record-breaking $75 million ransom

Staff Reporter Over the past year, ransomware attacks have reached unprecedented levels of ambition and boldness, highlighted by a significant increase in extortion attacks. In fact, research from Zscaler ThreatLabz revealed an unparalleled ransom payout of $75 million – the…

The Critical Role of Response Time in Cybersecurity

In today’s digital landscape, cybercriminals pose a perpetual threat to organisations. We are repeatedly reminded of the consequences of inadequate cybersecurity measures. In a cybersecurity breach, response time is critical to mitigating damage. Most cyber-attacks are like wildfires. Without the…

What Every Business Needs to Know About Ransomware

Today’s businesses rely heavily on technology to streamline operations, enhance productivity, and connect with customers. However, this dependency has also opened the door to a growing threat: ransomware attacks. By 2031, the cost of ransomware attacks is estimated to reach…

A Guide to Select the Best Operating System for NAS Data Recovery

Home users and businesses use NAS (Network-Attached Storage) to store and manage data clearly and organise it and make it easy to access. With simplified scripts and hardware pre-installed with an optimised operating system, the NAS architecture helps improve the…

4 Ways BYOI and Social Login Enhance User Experience

We live in an era where customers demand convenience and instant gratification and want to use their smartphones and mobile devices to access their apps and services instantly. At the same time, trust in established brands such as Google or…

Nine IT Experts Weigh in On Managed File Transfer (MFT)

In an era where everything IT-leaning is getting leaner, meaner, faster, and more secure, we need to make sure not to leave file transfers behind. As the security and IT landscapes modernize, organizations are increasingly looking for a way to…

Deepfakes: Distorted Reality and the Growing Threat

Today’s digital era is seeing the line between reality and fabrication become increasingly blurred, thanks to the advent of deepfake technology. Deepfakes are AI-generated videos or audio that convincingly mimic real people, making it appear like they said or did…

Understanding Compliance and File Integrity Monitoring (FIM)

In an age marked by frequent data breaches and cyber threats, organizations must follow strict regulatory standards to protect their sensitive and proprietary data. To remain compliant, they must also adhere to specific rules and guidelines aimed at data protection,…

Strategies for Merchant Ransomware Protection

Introduction Ransomware attacks have become a significant threat to businesses of all sizes, including merchants who rely on electronic payment systems for their operations. These malicious attacks can lock you out of your critical systems, encrypt your data, and demand…

Data Mapping vs. Data Lineage: Understanding The Differences

Securing data relies upon making sense of it. To achieve this, organizations rely on two key concepts: Data Mapping and Data Lineage. While these terms are often used interchangeably, they refer to distinct processes with different objectives and implications. This…

Why You Should Phish In Your Own Pond

Phishing – that scourge of the internet for several decades now – remains the most popular attack vector when it comes to bad actors trying to get their hands on confidential information. The targets span commercial enterprises, to government agencies (just ask…

12 Indispensable Online Tools for Startup Success

Introduction Starting a new business can be an exciting yet challenging endeavor. As an entrepreneur, you’ll need all the help you can get to streamline your operations, manage your resources efficiently, and reach your target audience effectively. Fortunately, the digital…

Localization Problems: 10 Biggest Challenges and Solutions

10 biggest challenges in localization Introduction As a seasoned localization expert, I have had the privilege of navigating the complex landscape of localization for years. Localization, the process of adapting content to a specific region or culture, is crucial for…

Storm-0324 Threat Group Expands Attack Vectors, Targeting Microsoft Teams

A financially driven cyber threat group that Microsoft has been tracking under the alias “Storm-0324” is expanding its cyber-attack methodologies. Historically, this group primarily infiltrated systems via email-based infection vectors, later passing on access to the compromised networks to other…

How to Backup Data from NAS: A Complete Guide

Network-attached storage (NAS) devices have become an integral part of modern digital life. These storage solutions provide a convenient way to store and access data from multiple devices over a local network or the internet. While NAS devices are known…

Selecting Sales Intelligence Software in 2023: A Comprehensive Guide

Introduction In today’s hyper-competitive business landscape, staying ahead of the competition and maximizing revenue requires access to accurate, up-to-date information about potential customers and market trends. This is where sales intelligence software comes into play. Sales intelligence software helps sales…

Eleven of the Best Open Source Hypervisor Technologies

Introduction Virtualization technology has revolutionized the way we use and manage computing resources. It allows multiple operating systems and applications to run simultaneously on a single physical server, improving resource utilization, scalability, and flexibility. Hypervisors are at the heart of…

China Threat Recap: A Deeper Insight

1. Accusation at the Heart of British Democracy Background on the Tory Parliamentary Expert A Tory parliamentary expert on China has been accused of spying for Beijing from a position at the very heart of the seat of British democracy…

Simple Guide: Enabling Virtualization on Windows 11

Virtualization is a powerful technology that allows you to run multiple operating systems on a single physical computer. Whether you’re a developer testing different software configurations, a gamer wanting to run Linux alongside Windows, or a professional needing to isolate…

Six ways to safeguard important digital assets

In today’s digital age, our lives are increasingly intertwined with technology. We store important documents, precious memories, financial information, and more in the digital realm. Protecting these digital assets is of paramount importance. Whether you’re concerned about losing valuable data…

Step Up Your Defense Against Cloud-loving Cybercriminals

Cybercriminals are capitalizing on a burgeoning opportunity, akin to a modern-day Gold Rush. With the escalating trend of enterprises migrating their data and applications to cloud environments, the potential for cloud-based cyberattacks continues to expand exponentially.   More cloud usage…

What is Software Localization: Everything You Need to Know!

In today’s interconnected world, software has become an integral part of our daily lives. From the apps on our smartphones to the software running on our computers, software applications have a global reach. However, as the world becomes more connected,…

Google Cloud Introduces Duet AI To Revolutionize Cybersecurity Operations

Overview Cybersecurity remains a top concern for organizations, given the growing frequency and sophistication of cyber threats. Google Cloud is taking unprecedented steps to confront these challenges head-on, unveiling innovations that leverage artificial intelligence (AI) for enhanced security. These announcements…

FBI Dismantles QakBot Botnet In Largest-Ever Cybercrime Operation

Operation Duck Hunt Seizes 52 Servers, Over $8.6 Million in Cryptocurrency In a groundbreaking achievement that marks a significant win for global cybersecurity, the FBI, leading a multinational law enforcement coalition, has dismantled QakBot, a notorious malware loader heavily exploited…

Which Is Better For File Security: Cloud Or NAS Backup?

Introduction In today’s digital age, data security is paramount, with individuals and businesses alike seeking reliable methods to safeguard their valuable files and information. Two popular options that have gained significant attention are Cloud Backup and Network Attached Storage (NAS)…

WHICH IS BETTER FOR FILE SECURITY: CLOUD OR NAS BACKUP?

Introduction In today’s digital age, data security is paramount, with individuals and businesses alike seeking reliable methods to safeguard their valuable files and information. Two popular options that have gained significant attention are Cloud Backup and Network Attached Storage (NAS)…

How Do Microsoft Azure and Amazon AWS Differ From One Another?

In the rapidly evolving landscape of cloud computing, Microsoft Azure and Amazon Web Services (AWS) stand out as two of the most prominent and widely adopted cloud platforms. As businesses increasingly shift their IT infrastructure to the cloud, understanding the…

St Helens Council Targeted In Suspected Ransomware Attack

St Helens Borough Council in Merseyside has fallen victim to a suspected ransomware attack, according to an official statement released on Monday, August 21. The local authority has described the incident as a “complex and evolving situation,” with cybersecurity experts…

The Importance of SaaS Backup and Disaster Recovery: Reasons to Consider

In today’s digital landscape, Software-as-a-Service (SaaS) solutions have become integral to the operations of countless businesses. These cloud-based applications offer convenience, scalability, and accessibility like never before. However, with the increasing reliance on SaaS applications, the need for robust backup…

What’s Beyond SASE? The Next Steps

In an era where cybersecurity is paramount, the emergence of Secure Access Service Edge (SASE) has revolutionized network protection. However, as technology advances at an unprecedented pace, the question arises: What lies beyond SASE? This article delves into the evolution…

Tips for Backing Up an Amazon EC2 Instance

In today’s digital landscape, data is invaluable. As businesses and individuals increasingly rely on cloud computing services like Amazon Web Services (AWS), safeguarding data becomes a top priority. Amazon Elastic Compute Cloud (Amazon EC2) is a widely used cloud computing…

MSPs and Cybersecurity: Fortifying the Partnership for Advanced Protection

In today’s increasingly digitized world, the importance of cybersecurity cannot be overstated. From multinational corporations to small businesses, and even individual users, everyone is vulnerable to the ever-evolving landscape of cyber threats. Managed Service Providers (MSPs) have emerged as crucial…