Tag: Information Security Buzz

Creating a SQL Azure Database Backup and Restore

In the digital age, data is the lifeblood of businesses and organizations. Protecting this valuable asset is crucial to ensuring business continuity and safeguarding against unforeseen events. In the realm of databases, one of the essential practices for data protection…

Fantastic Advice To Protect Data Privacy

In our increasingly interconnected world, the protection of data privacy has become a paramount concern. With the rapid advancement of technology and the widespread use of the internet, personal and sensitive information is more vulnerable than ever before. From financial…

How to backup Microsoft 365 using third-party backup tools

The best practices and tips for implementing third-party backup tools, including choosing a reliable tool, determining what to back up and setting up a backup schedule. As more and more organizations rely on cloud-based solutions like Microsoft 365, data protection…

How To Build A Company-Wide Data-Driven Culture

A data-driven culture is a mindset, a philosophy that encompasses more than mere data collection. It signifies an entire organization’s shift, where every decision is underpinned by data analytics, evidence, and insights, rather than merely relying on intuition or anecdotal…

Crash Test: REST API vs. SOAP Security

REST and SOAP APIs are the two most common application protocols that define how to build application programming interfaces (APIs). While they share some similarities, there are critical differences that organizations must understand to secure their REST and SOAP APIs…

How to Backup Amazon EC2 Instance

The Amazon Elastic Compute Cloud, popularly known as EC2, is used to run applications on Amazon Web Services (AWS). The amount of data available since the invention of the Internet has increased a great deal. This has increased the need…

Missing The Point In The Current Age Of Cyber

Considering the known-known statistics, we seem to encounter a serious security breach at least once a week – and these are only the events which are notified or discovered. In fact, according to the BreachAware Report issued end July 2023,…

Insider Threat Protection And Modern DLP

In today’s rapidly evolving digital landscape, organizations face an ever-increasing number of cybersecurity threats. Among these, insider threats are among the most challenging and potentially damaging. Insider threats are the intentional or unintentional misuse of an organization’s assets, systems, or…

5 Essential Tips For Data Security On The Cloud

Moving to the cloud often means lower costs, 24/7 access, and higher security. But higher security doesn’t mean guaranteed. It takes two to make cloud security work: the cloud service provider, and you—the user. While a reputable cloud service provider…

TETRA Communication Systems Vulnerabilities Expose Critical Infrastructure

Security researchers from Midnight Blue, a Netherlands-based security firm, have discovered five vulnerabilities in the Terrestrial Trunked Radio (TETRA) communication systems. These systems are extensively used by government agencies, law enforcement, and emergency services organizations across Europe, the United Kingdom,…

The New Summer Vacation Necessity: Cyber Hygiene

Ah, summer vacation. Something we almost all look forward to each year – a time to relax and reset. It’s a time for employees to take a much-deserved break from work and recharge their batteries. It’s also a time for…

Symantec DLP Product Review

In the digital age, data is one of the most valuable assets a company can possess. However, with the increasing value of data comes the increasing risk of data loss, breaches, and non-compliance with data protection regulations. This is where…

Forcepoint DLP Product Review

In the realm of data loss prevention (DLP) solutions, Forcepoint DLP has solidified itself as a market-leading choice, recognized for its comprehensive coverage, robust feature set, and user-friendly interface. This review delves into the strengths and potential shortcomings of this…

Insider Threat vs Outsider Threat: Which is Worse?

Today’s evolving interconnected digital world has created a diverse and intricate threat landscape for organizations. Within this landscape, insider and outsider threats have emerged as significant security risks organizations must address. While the debate regarding the severity of insider versus…

How Does Android Stack Up vs iOS?

Our recent Threat Report showed that while, on the whole, overall threat detections fell by 13.2%, there was one category that thrived: Android. The category registered a remarkable growth of 57% in detections, driven by a 163% increase in Adware…

Recap Of The Week: Exploring Key News And Events

Meta Faces Hefty €1.2bn Fine For GDPR Breach In EU-US Data Transfers Meta was fined €1.2bn for transmitting consumer data to the US. Ireland’s Data Protection Commission (DPC) punished Facebook for EU data protection violations on Monday. It said Dublin-based…

Augusta Cyberattack Claimed By BlackByte Ransomware Group

After days of doubt, and despite official claims of a “cyber incident,” the BlackByte ransomware gang has claimed credit for the computer attack on the City of Augusta. BlackByte, notorious for attacking the US government and financial institutions as well…

Invisible Chinese Hackers Penetrate American Bases And Guam

According to Microsoft and the “Five Eyes” governments, an invisible Chinese hackers infiltrated and remained undetected in critical infrastructure organizations in the United States and Guam for years. Under the codename Volt Typhoon, the tech giant’s threat intelligence team is…

Buhti Ransomware Adopts Stolen Encryptors For Windows & Linux

The perpetrators behind the budding Buhti ransomware have abandoned their own payload in favor of exploiting vulnerabilities in Windows and Linux using the exposed LockBit and Babuk ransomware families. The cybersecurity firm knows them as Blacktail and is following them.…

What’s Russia Planning?

Back in March, Microsoft released data suggesting that Russian hacker groups were appearing to be preparing for a renewed wave of cyber-attacks against Ukraine, including a ransomware-style threat to organisations serving Ukraine’s supply lines. At the time, Clint Watts, General…

12 Ways To Protect Small Businesses From Cyberattacks

Many small businesses believe they are immune to cyberattacks because of their presumed lack of valuable information (such as customer data or computing resources), but this is far from the truth. The allure of a small business to cybercriminals lies…

5 Ways Hackers Will Use ChatGPT For Cyberattacks

Picture this: you are a developer working tirelessly to streamline your workflows and keep up with the ever-increasing demands of your organization. But what if the AI and automation tools you rely on to make your job easier could be…

Micron: China Issues Ban On US Chipmaker

The Chinese government has ordered infrastructure operators to stop buying Micron Technology chips. The action follows a US prohibition on using the social video app TikTok on government phones and US limitations on exporting some advanced computer components to China.…

Investigating Risks Through Threat Hunting Capability Guide

Threat hunting is the means of exploring and searching for malicious software or unauthorized users on your network. Since a security information and event management (SIEM) system gives insight into network, endpoint, and application behavior that may indicate an attack,…

Catch Up On This Week’s News and Events

Toyota: Tragic Data Breach, 2 Million Vehicles Affected For Ten Years Toyota revealed a data breach from ten years ago that impacted over 2 million cars. The breach affected their cloud-based Connected service, which is limited to Japanese cars between…

Apple Deploys Emergency Patches To Thwart 3 Zero-Day Threats

VulnerabilitiesApple released security patches for iOS, iPadOS, macOS, tvOS, watchOS, and Safari on Thursday to address three new zero-day issues that are being actively exploited. The three security issues are. 1. WebKit bug CVE-2023-32409 could allow a hostile actor to…

Lemon Group Exploits 8.9 Million Pre-Infected Android Phones

Significant supply chain concerns are posed by the cybercrime organization Lemon Group, which is exploiting millions of pre-infected Android handsets around the world to carry out malicious operations. Cybersecurity firm Trend Micro stated that infected smartphones became “mobile proxies,” or…

Unveiling The Power Of Cybersecurity Monitoring Capability Guide

In today’s digital age, where cyber threats continue to evolve, organizations must remain vigilant in protecting their sensitive information and digital assets. Cybersecurity monitoring plays a vital role in this endeavor, acting as a proactive defense mechanism against malicious activities…

DevSecOps Capability Guide

Cybersecurity’s increased influence in this digital ecosystem can be traced to the rise of DevSecOps. Organizations are becoming more aware of the necessity of giving security top priority in their software development procedures as a result of the frequency and…

Key Metrics In Evaluating DevOps Threat Matrix

Another is the codecov breach, where the attack was made on their docker images and credentials, and the private data of thousands of customers were stolen. This shows that the consequences of successful attacks can be severe, as evidenced by these…

Lacroix Shuts Down Facilities After Ransomware Attack

According to reports, international electronics firm Lacroix thwarted a cyberattack on its French (Beaupréau), German (Willich), and Tunisian (Zriba) activity sites. The company claims it has temporarily disabled a number of its online services in order to analyze the damage…

Chinese Hackers Mustang Panda Attacks TP-Link Routers

The Chinese state-sponsored hacking outfit “Camaro Dragon” attacks household TP-Link routers with bespoke “Horse Shell” malware to attack European foreign affairs organizations. Hackers use backdoor virus in custom firmware for TP-Link routers to launch assaults from home networks. According to…

Merdoor Backdoor Exploits Agencies By The Lancefly APT

South and Southeast Asian government, airline, and telecom institutions have been targeted by a new APT hacking outfit called Lancefly, which employs a variant of the ‘Merdoor’ backdoor malware. Symantec Threat Labs announced today that Lancefly has been using the…

5.8 Million People Affected by Data Breach at PharMerica

On April 8 that the Money Message ransomware organization attacked the national pharmacy network PharMerica and its parent company. The home and community healthcare business BrightSpring Health. Threat actors exposed evidence data, a statement was obtained from BrightSpring, and additional…

Review Of News and Events That Happened This Week

A rundown of the headlines of news and events from the past week pertaining to ransomware, data breaches, quick response security, and other related topics. Malware Attacks From SmokeLoader And RoarBAT, CERT-UA Warns CERT-UA has reported the spread of SmokeLoader…

Tech Provider ABB Struck By Black Basta Ransomware Attacks

The Black Basta ransomware assault apparently hampered business activities at the Swiss multinational corporation ABB, a renowned electrification and automation technology provider. ABB has its headquarters in Zurich, Switzerland, and in 2022 expects to bring in $29.4 billion in sales…

Severe Ruckus RCE Flaws Utilized By Fresh DDoS Botnet Malware

“AndoryuBot’ is a new malware botnet that infects unpatched Wi-Fi access points for DDoS assaults using a key Ruckus Wireless Admin panel weakness. CVE-2023-25717 allows remote attackers to execute code on susceptible Ruckus Wireless Admin panels version 10.4 and older…