At our recent Energy and NERC Compliance Working Group, we took some time to share more about Fortra, the cybersecurity company that Tripwire is a part of. In case you missed it, Fortra is a rebranding of HelpSystems, an already…
Category: Blog RSS Feed
Holiday Shopping: Tips and Best Practices to Help you Stay Secure
As we approach the holiday season, in addition to our busy work schedules, we need to plan for family visits, develop menus for special meals, and do a little shopping while the deals are good! It’s a lot to keep…
How Does NIST’s AI Risk Management Framework Affect You?
While the EU AI Act is poised to introduce binding legal requirements, there’s another noteworthy player making waves—the National Institute of Standards and Technology’s (NIST) AI Risk Management Framework (AI RMF) , published in January 2023. This framework promises to…
QR Code Phishing –What Is It?
Phishing is a longstanding danger of the digital world that most people are aware of. Whether it happens via email, text message, social media, or any other means, phishing presents a risk to all users. In recent years, the growing…
Guarding the Grid: Navigating the Current and Future Landscape of Utility Cybersecurity
Tripwire recently held its annual Energy and NERC Compliance Working Group. This year’s attendees included more than 200 Tripwire customer utility personnel representing over 80 different registered entities from all across the US and Canada. The company sizes ranged from…
NIST NCCoE Publishes Cybersecurity Framework Profile for Hybrid Satellite Networks
In late September 2023, the US-based National Institute of Standards and Technology (NIST) published its Cybersecurity Framework Profile for Hybrid Satellite Networks, otherwise known as NIST IR 8441. This blog will explore the reasons behind NIST developing the framework, outline…
$9 million seized from “pig butchering” scammers who preyed on lonely hearts
US authorities have seized almost $9 million worth of cryptocurrency linked to a gang engaged in cryptocurrency investment fraud and romance scams. The US Department of Justice has announced that the seized funds are connected to cryptocurrency wallet addresses alleged…
UK Finance Reports Slight Decrease in FinTech Cyberattacks
Overview of UK Finance’s Report The latest report from UK Finance paints a mixed picture of financial fraud in the United Kingdom, with losses exceeding £500 million in the first half of the year. However, amidst these concerning figures, there…
The Cybersecurity Skills Gap: You’re Looking at the Wrong Gap
How many times have you heard “There is a skills gap in Cybersecurity!” If you go on social media, you’ll likely hear it at least once a day. The government is big on it, and organisations lament how difficult it…
SMB Protocol Explained: Understanding its Security Risks and Best Practices
Server Message Block (SMB) protocol is a communication protocol that allows users to communicate with remote servers and computers, which they can open, share, edit files, and even share and utilize resources. With the expansion of telecommunications, this protocol has…
AI-Enabled Information Manipulation Poses Threat to EU Elections: ENISA Report
Amid growing concerns about the integrity of upcoming European elections in 2024, the 11th edition of the Threat Landscape report by the European Union Agency for Cybersecurity (ENISA) , released on October 19, 2023, reveals alarming findings about the rising…
Change Variance: How Tiny Differences Can Impact Your IT World
In the vast and ever-evolving universe of information technology, there’s one constant: change (that and cliches about constants!). Servers, systems, and software – they all get updated and modified. But, have you ever stopped to consider how even tiny differences…
Phishing Trends Examined by the SANS Institute
Earlier this year, the SANS Institute published a blog exploring emerging phishing trends. This kind of research is an invaluable resource for all individuals and organizations looking to identify and rebuff phishing attacks. In this article, we’ll cover some of…
The Six Pillars of Cybersecurity
Winter is coming In the ever-evolving landscape of cloud computing, ensuring robust security measures has never been more important. In the new ISO 27001:2022 standard, there is a new requirement for organisations to establish control of their Cloud services, which…
Financial Institutions in New York Face Stricter Cybersecurity Rules
Boards of directors need to maintain an appropriate level of cyber expertise, incidents must be reported within 72 hours after determination, and all ransom payments made must be reported within a day. Those are just some of the changes made…
Secure Access Control in 2024: 6 Trends to Watch Out For
What Is Secure Access Control? Secure access control, part of the broader field of user management , is a key concept in the realm of information security, particularly in the business environment. It refers to the process of selectively restricting…
VERT Threat Alert: November 2023 Patch Tuesday Analysis
Today’s VERT Alert addresses Microsoft’s November 2023 Security Updates . VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1082 on Wednesday, November 15th. In-The-Wild & Disclosed CVEs CVE-2023-36033 A vulnerability in the Microsoft Desktop Window…
How Does IoT Contribute to Real-Time Grid Monitoring for Enhanced Stability and Fault Detection?
More decision-makers are investing in grid modernization efforts, knowing that doing so is necessary for keeping pace with modern demands. For example, smart grid fault-detection sensors could warn utility company providers of problems in real time, preventing costly and inconvenient…
A Simplified Overview of the MITRE ATT&CK Framework
In the world of cybersecurity, have you ever wondered about the inner workings of threat actors as they attempt to breach systems, their methods, tactics, and strategies, and how they seamlessly converge to execute a successful attack? It’s not merely…
Cloud Watching Report: Key Takeaways
The capabilities of cloud computing have changed the digital landscape significantly, and the popularity of cloud solutions only continues to increase. According to Gartner , the market for public cloud services is expected to surpass 700 billion USD by the…
CherryBlos, the malware that steals cryptocurrency via your photos – what you need to know
What’s the deal with CherryBlos? CherryBlos is a rather interesting family of Android malware that can plunder your cryptocurrency accounts – with a little help from your photos. Wait. I’ve heard of hackers stealing photos before, but what do you…
Key Highlights from the 2023 UK Cyber Crime Landscape
It’s 2023, and the landscape of cybercrime in the United Kingdom is evolving unprecedentedly. This year’s cyber threat landscape is shaped by many factors, from the continuing effects of the global pandemic to the ever-expanding digital footprint of individuals and…
Some Financial Institutions Must Report Breaches in 30 Days
The heat has just been turned up for companies hoping to “hide out” a data breach. Announced October 27th, all non-banking financial institutions are now required to report data breach incidents within 30 days. The amendment to the Safeguards Rule…
Looking Ahead: Highlights from ENISA’s Foresight 2030 Report
One of the most important factors in the technology and cybersecurity industries is the inevitable presence of constant change. Technology, business, and industry are always evolving, while cybercriminals are always searching for new and innovative ways to attack. While there…
Google introduces real-time scanning on Android devices to fight malicious apps
It doesn’t matter if you have a smartphone, a tablet, a laptop, or a desktop computer. Whatever your computing device of choice, you don’t want it impacted by malware. And although many of us are familiar with the concept of…
What We Learned From “The Cyber-Resilient CEO” Report
In today’s digital landscape, cybersecurity is not just a technical concern; it’s a strategic imperative. As we delve into the insights from a recent report from Accenture titled ” The Cyber-Resilient CEO ,” we’ll uncover CEOs’ critical role in safeguarding…
What is Classiscam Scam-as-a-Service?
“The ‘Classiscam’ scam-as-a-service operation has broadened its reach worldwide, targeting many more brands, countries, and industries, causing more significant financial damage than before,” touts Bleeping Computer . So just what is it? What is Classiscam? It’s a bird. It’s a…
Container Security Essentials: Vulnerability Scanning and Change Detection Explained
Containers offer a streamlined application deployment and management approach. Thanks to their efficiency and portability, platforms like Docker and Kubernetes have become household names in the tech industry. However, a misconception lurks in the shadows as containers gain popularity –…
Massive Surge in Security Breaches of Pensions Prompt Questions
A recent report from RPC has revealed that cybersecurity breaches in UK pension schemes increased by 4,000% from 2021/22 to 2022/23. Understandably, the announcement has raised serious concerns about the efficacy of financial service organization’s cybersecurity programmes. Although the reasons…
Simple Reminders to Conclude Cybersecurity Awareness Month
2023 marked the 20th Cybersecurity Awareness Month which was founded as a collaboration between government and the private industry to raise awareness about digital security and empower everyone to protect their personal data from digital forms of crime. While most…
Tripwire Patch Priority Index for October 2023
Tripwire’s October 2023 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the patch priority is a patch for Microsoft Edge (Chromium-based) that resolves a type confusion vulnerability. Next on the patch priority list this month are…
A Scary Story of Group Policy Gone Wrong: Accidental Misconfigurations
In the world of cybersecurity, insider threats remain a potent and often underestimated danger. These threats can emanate not only from malicious actors within an organization but also from well-intentioned employees who inadvertently compromise security with a mis-click or other…
6 Common Phishing Attacks and How to Protect Against Them
Phishing is still as large a concern as ever. “If it ain’t broke, don’t fix it,” seems to hold in this tried-and-true attack method. The Verizon 2023 Data Breach Report states that phishing accounted for 44% of social engineering incidents…
Phony job vacancy targets LinkedIn users with DarkGate malware
Job hunters should be on their guard. Researchers at security firm WithSecure have described how fake job opportunities are being posted on LinkedIn with the intent of spreading malware. A Vietnamese cybercrime gang is being blamed for a malware campaign…
What you should know about VPN audits
The main reasons internet users choose to use a virtual private network (VPN) are to protect their online identity and bypass geo-restrictions. Cybercrime is on the rise and is expected to grow each year – the largest breach of 2023…
Security in the Property Industry: Challenges and How to Avoid Attacks
In recent years, there has been a major ongoing trend toward more digital infrastructure and an increased dependence on technology across a wide variety of sectors. In the property industry, this has manifested heavily in the growth of the property…
5 Tripwire Enterprise Misconfigurations to Avoid
Configuration management is vitally important as part of a sound cybersecurity strategy. We have previously published how patching alone is not enough, as that does not alter a system’s customized configuration. Misconfigurations can be as damaging to security as a…
The growth of APIs attracts Cybercrime: How to prepare against cyber attacks
Application Programming Interfaces (APIs) have profoundly transformed the internet’s fabric. In the pre-API era, digital interactions were limited by siloed systems functioning in isolation. APIs dismantled these barriers by introducing a universal language that diverse applications could comprehend. This linguistic…
Blockchain Security: Understanding vulnerabilities and mitigating risks
In recent years, blockchain technology has garnered significant attention thanks to its remarkable tamper-proof features and robust security. It is also expected that the blockchain technology market will exceed 1.2 billion US dollars by 2030, with an annual growth rate…
Cyber Insurance Report: Breach Frequency Down, Breach Severity Up
The past half-decade has been a particularly tumultuous one for cybersecurity. It has borne witness to some of the most damaging attacks in history, unprecedentedly high data breach rates, and a staggering number of emerging threat groups. However, a new…
Ex-Navy IT manager jailed for selling people’s data on the dark web
A former US Navy IT manager has been sentenced to five years and five months in prison after illegally hacking a database containing personally identifiable information (PII) and selling it on the dark web. 32-year-old Marquis Cooper, of Selma, California,…
What We Learned from the 2023 Annual Cybersecurity Attitudes and Behaviors Report
In the brisk air of early autumn, optimism fills our hearts as we celebrate the 20th anniversary of Cybersecurity Awareness Month, an annual event dedicated to fostering a deeper understanding of cybersecurity and inspiring behavior change. Two decades ago, the…
Plastic surgeries warned by the FBI that they are being targeted by cybercriminals
Plastic surgeries across the United States have been issued a warning that they are being targeted by cybercriminals in plots designed to steal sensitive data including patients’ medical records and photographs that will be later used for extortion. The warning…
The Peril of Child Identity Theft and How to Mitigate It
We often hear of how we need to protect ourselves from online scams. Criminals seek our personal information in order to use it for multiple nefarious purposes. However, there is a population who, while not having a broad online presence,…
Save the Embarrassment: The Value of Multi-Factor Authentication
These days, it’s not a matter of if your password will be breached but when. Major websites experience massive data breaches at an alarming rate. Have I Been Pwned currently has records from 705 sites comprising 12.6 billion accounts. This…
What is a CMDB?
There are countless tools and technologies available to help an organization stay on top of its IT assets, and a configuration management database (CMDB) is an extremely useful one. The database keeps track of relevant information regarding various hardware and…
Understanding Cybersecurity Footprinting: Techniques and Strategies
Footprinting, also known as fingerprinting, is a methodology used by penetration testers, cybersecurity professionals, and even threat actors to gather information about a target organization to identify potential vulnerabilities. Footprinting is the first step in penetration testing. It involves scanning…
Cyberattacks on Gaming Developers: Five Security Tips
Gaming companies collect data concerning user behavior for a variety of reasons: to inform investment and content decisions, enable game and advertisement personalization, and improve gameplay, to name a few. However, the data available provides a daunting task for those…
Fortifying IoT Devices: Unraveling the Art of Securing Embedded Systems
Interconnected, data-enabled devices are more common now than ever before. By 2027, it is predicted that there will be more than 41 billion new IoT devices . The emergence of each new device offers a fresh vulnerability point for opportunistic…
Top 7 Technical Resource Providers for ICS Security Professionals
Attacks against industrial control systems (ICS) are on the rise. Cyberattacks are more prevalent, creative and faster than ever. So, understanding attackers’ tactics is crucial. The IBM Security X-Force Threat Intelligence Index 2023 highlights that backdoor deployments enabling remote access…
Report Explores UK Companies’ Struggle to Address Growing Cybersecurity Threats
One of the most reliable constants in the cybersecurity world is that threats are always increasing as cybercriminals advance their tactics and develop new ones. It can be a daunting task for organizations to continually stay on top of these…
Decoding Data Security Posture Management – Separating Truth from Myth
Data is expanding beyond environments, applications, and geographical boundaries. It is safe to say that we are currently experiencing the era of the Big Bang of Data. It is driving economies and industries. Organizations that can leverage data to its…
Compliance vs. Security: Striking the Right Balance in Cybersecurity
Compliance and security often go hand in hand as ideas that attempt to protect against cyber threats. While both compliance and security are designed to lower risk, they are not mutually inclusive—that is, not everything that is required for compliance…
Revealed! The top 10 cybersecurity misconfigurations, as determined by CISA and the NSA
A joint cybersecurity advisory from the United States’s National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) has shone a light on the top ten most common cybersecurity misconfigurations found in large private and public organisations. The report…
Tripwire Patch Priority Index for September 2023
Tripwire’s September 2023 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the patch priority are patches for Microsoft Edge (Chromium-based) that resolve 5 vulnerabilities such as out of bounds memory access, type confusion, and use after…
How MSSPs Help with Cybersecurity Compliance
While always a part of business, compliance demands have skyrocketed as the digital world gives us so many more ways to go awry. We all remember the Enron scandal that precipitated the Sarbanes-Oxley Act (SOX). Now, SOX compliance means being…
It’s Cyber Security Awareness Month V.19, and the Password Manager is Becoming Obsolete
Cyber Security Awareness Month kicked off its nineteenth anniversary this year. One would hope that after nearly two decades, this would be a time to celebrate, however, the outlook is not as bright as one would expect. There are so…
Key Takeaways from the 2023 Domain Impersonation Report
One of the most pervasive and unavoidable threats on the internet, domain impersonation can be used by bad actors as the basis for a wide range of attacks. The various ways in which cybercriminals make use of lookalike domains often…
What is NERC? Everything you need to know
Electric grids are part of every nation’s critical infrastructure. Every societal activity and business depends on reliable and safe electricity distribution. The US electric grid is a huge network of powerlines, distribution hubs, and renewable and non-renewable energy generators that…
ICS Environments and Patch Management: What to Do If You Can’t Patch
The evolution of the cyber threat landscape highlights the need for organizations to strengthen their ability to identify, analyze, and evaluate cyber risks before they evolve into security incidents. Known unpatched vulnerabilities are often exploited by criminals to penetrate Industrial…
Fighting AI Cybercrime with AI Security
On August 10th, the Pentagon introduced ” Task Force Lima ,” a dedicated team working to bring Artificial Intelligence (AI) into the core of the U.S. defense system. The goal is to use AI to improve business operations, healthcare, military…
ZeroFont trick dupes users into thinking message has been scanned for threats
It’s nothing new for cybercriminals to use sneaky HTML tricks in their attempt to infect computers or dupe unsuspecting recipients into clicking on phishing links. Spammers have been using a wide variety of tricks for years in an attempt to…
What Does Secure by Design Actually Mean?
In this era shaped by digital innovation, the concept of Secure by Design is a critical safeguard against cyber threats. Read on to delve into the essence of Secure by Design and its profound relevance in today’s technology landscape. As…
The Cost of Cybercrime in the US: Facts and Figures
The importance of cybersecurity is no secret in our increasingly digital world. Even individuals who have no experience or expertise in tech or related fields are aware of the threat of hacking, phishing, and the like. It can be difficult,…
Closing Integrity Gaps with NIST CSF
The then-new 2014 NIST Cybersecurity Framework (CSF) was designed to plug security gaps in operational technology. It’s still in use today and more relevant than ever. Fortra’s whitepaper provides a cohesive review of this security staple and how to glean…
Best 10 Cybersecurity Podcasts
The cybersecurity industry is one in which staying in the loop on recent developments is incredibly important. Because technologies, industry conditions, and the threat landscape all change so frequently, it can be difficult to remain up to date on news,…
Visibility: An Essential Component of Industrial Cyber Security
In July 2021, the White House established a voluntary initiative for industrial control systems (ICS) to promote cooperation between the critical infrastructure community and the federal government. The fundamental purpose of the initiative was “to defend the nation’s critical infrastructure…
8 of the Best Cybersecurity Conferences
In the rapidly evolving realm of digital security, staying ahead of cyber threats requires continuous learning and collaboration. Cybersecurity conferences stand as beacons of knowledge, drawing experts and enthusiasts from across the globe. We’ve curated a list of the top…
Defending against DDoS Attacks: What you need to know
Patience is one of those time-dependent, and often situational circumstances we experience. Few things define relativity better than patience. Think of the impatience of people who have to wait ten minutes in a line at a gas station, yet the…
Snatch ransomware – what you need to know
What’s happened? The FBI and US Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint advisory warning organisations about a ransomware-as-a-service operation called “Snatch.” Snatch? As in the movie from twenty odd years ago? I’m not sure I’ve heard…
Understanding Malicious Package Attacks and Defense Strategies for Robust Cybersecurity
Malicious packages consist of software embedded with code that is capable of causing harm to an entire system or network . This is a rapidly growing threat affecting open-source software and the software supply chain. This attack method has seen…
Increasing Your Business’ Cyber Maturity with Fortra
When building a tower, it helps to start with a sturdy foundation. Cyber maturity is the tower, and there are three levels that build it: Foundational IT/OT & Security Control Processes Fundamental Security Control Capabilities Advanced Security Control Capabilities Fortra…
FBI’s Most Wanted Cybercriminals in 2023
In an increasingly digitized world, the threat of cybercrime looms larger than ever. The FBI’s relentless pursuit of cybercriminals remains a critical defense against this growing menace. We’re well into 2023, and the FBI’s Most Wanted Cybercriminals list takes center…
The Consequences of Non-Compliance in Cybersecurity: Risks and Penalties
Non-compliance in cybersecurity marks a grave oversight. It involves neglecting established security protocols, leaving organizations vulnerable to malicious actors. Read on as we examine the potential risks of non-compliance, including heightened susceptibility to cyberattacks, the specter of data breaches, and…
General Data Protection Regulation (GDPR) – The Story So Far
Do you remember where you were on 25th May 2018? Perhaps you were enjoying a Friday night drink with friends. Perhaps you were with family, relaxing after a busy week at work. I was actually having a GDPR Birthday party…
How to Build an Effective ICS Security Program
How to Build an Effective ICS Security Program Of all the different areas of cybersecurity, not many are as important, or have as far-reaching consequences as industrial control systems (ICS) security. While most relevant organizations would agree that ICS security…
How to Protect Your Facebook Account from Cybercriminals
The social media landscape has undergone dramatic change in recent years. Elon Musk bought Twitter and changed its name to “X.” Mark Zuckerberg bought Instagram and WhatsApp before launching Threads to capitalize on Twitter’s recent PR disasters. TikTok came out…
BLASTPASS: Government agencies told to secure iPhones against spyware attacks
What’s happened? CISA, the United States’s Cybersecurity and Infrastructure Security Agency, has ordered federal agencies to patch their iPhones against vulnerabilities that can be used as part of a zero-click attack to install spyware from the notorious NSO Group. A…
Guarding Against Fileless Malware: Types and Prevention
Fileless malware, true to its name, is malicious code that uses existing legitimate programs in a system for compromise. It operates directly in the Random Access Memory (RAM) without requiring any executable files in the hard drive. Differing from conventional…
5 Reasons Why You Should Conduct Regular Cybersecurity Audits
Cyber threats are growing more sophisticated, covert, and frequent every day. This year alone has seen the likes of T-Mobile and PharMerica suffering serious security breaches. These incidents disrupted operations and threatened their bottom lines, not to mention the lingering…
Around the World in IOT Days (Security Frameworks Edition)
The term Internet of Things (IoT) describes a network of technologies and services where various devices are interconnected and exchange data. These devices can be anything from wearable fitness trackers, smart televisions, and wireless infusion pumps to cars and many…
VERT Threat Alert: September 2023 Patch Tuesday Analysis
Today’s VERT Alert addresses Microsoft’s September 2023 Security Updates , which includes a recently introduced release notes format. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1073 on Wednesday, September 13th. In-The-Wild & Disclosed CVEs…
Life in the Clouds: Navigating Security Challenges in Cloud Environments
As the realm of technology continues to evolve, the significance of cloud computing has grown exponentially. This paradigm shift offers unparalleled scalability, efficiency, and cost-effectiveness benefits. However, with these advantages come a host of security challenges that need careful consideration.…
10 Mistakes in Cybersecurity and How to Avoid Them
It’s easy to rest on our laurels. Prevent a few breaches – or go long enough without one – and you start to feel invincible. While our efforts are certainly laudable, we can’t get too comfortable. As defenders, we always…
OT Security: Risks, Challenges and Securing your Environment
Before the revolution of Information Technology (IT), the world experienced the revolution of Operational Technology (OT). Operational Technology is the combination of hardware and software that controls and operates the physical mechanisms of industry. OT systems play an important role…
Tripwire Patch Priority Index for August 2023
Tripwire’s August 2023 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the patch priority list this month are patches for Microsoft Office, Excel, Visio, Teams, and Outlook. The patches resolve 10 issues including remote code execution,…
Thousands of dollars stolen from Texas ATMs using Raspberry Pi
A Texas court has heard how last month a gang of men used a Raspberry Pi device to steal thousands of dollars from ATMs. According to local media reports , three men were arrested in Lubbock, Texas, after attempting to…
5 Common Business Mistakes in Ransomware Prevention Planning
One thing is becoming evident as ransomware attacks increase in frequency and impact: businesses can take additional precautions. Unfortunately, many companies are failing to do so. Most victims are sufficiently warned about potential weaknesses yet unprepared to recover when hit.…
What is ISO 27002:2022 Control 8.9? A Quick Look at the Essentials
The basic parameters that control how hardware, software, and even entire networks operate are configurations, whether they take the form of a single configuration file or a collection of connected configurations. For instance, the default properties a firewall uses to…
Achieving Superior Security with Continuous Compliance
In a digital-first world, safeguarding sensitive data and ensuring compliance with industry regulations are paramount. Enter “Continuous Compliance” – a dynamic approach reshaping the cybersecurity paradigm . As a key part of an effective compliance strategy, continuous compliance is pivotal…
2023 Cost of a Data Breach: Key Takeaways
2023 Cost of a Data Breach: Key Takeaways It’s that time of year – IBM has released its “ Cost of a Data Breach Report .” This year’s report is jam-packed with some new research and findings that highlight how…
Summary of South Africa’s Protection of Personal Information Act (PoPIA)
South Africa’s Protection of Personal Information Act (PoPIA), also known as the PoPI Act, is a comprehensive data protection legislation designed to safeguard the privacy and information of South African citizens. While Jacob Zuma assented to PoPIA in November 2013,…
Working with a Reliable Partner for Cybersecurity Success
Technology companies are often seen as revolving doors of constantly shifting personnel. Whether they are seeking a better work environment or chasing a higher paycheck, these staff changes can hurt an organization’s progress. Worse yet, the customers are often negatively…
Understanding Firewalls – Types, Configuration, and Best Practices for Effective Network Security
A firewall is a security device that controls the flow of traffic across a network. A firewall may be a hardware appliance, or it may be a piece of software that runs on a third-party operating system. Firewalls operate based…
Updated NCSC Report Highlights Key Threats for the UK Legal Sector
On June 22nd, 2023, the National Cyber Security Centre ( NCSC ), the UK’s cybersecurity agency, released a Cyber Threat Report for the country’s legal sector. Developed to update a previous iteration from 2018, the report reflects a dramatic change…
How To Hide Browsing History – Complete Guide
In years gone by, there was a stigma attached to hiding one’s browsing history. Wiping browsing history was seen as suspicious; it suggested that someone had something to hide. It was – and still is- the butt of many jokes.…
What is The Network and Information Security 2 Directive (NIS2)?
The Network and Information Security 2 ( NIS2 ) Directive is the European Union’s (EU) second attempt at an all-encompassing cybersecurity directive. The EU introduced the legislation to update the much-misinterpreted Network and Information Security (NIS) Directive (2016) and improve…
How Improved Visibility Helps Achieve Compliance
In the ever-evolving cybersecurity landscape, businesses face an exhaustive battle to safeguard their valuable data while complying with industry regulations. To address these challenges, innovative solutions have emerged to enhance network security. Network visibility remains a crucial focus. The profound…
North Korea ready to cash out more than $40 million in Bitcoin after summer of attacks, warns FBI
After a series of high-profile cryptocurrency heists, a state-sponsored North Korean malicious hacking group is poised to cash out millions of dollars. That’s the opinion of the FBI, which this week has warned cryptocurrency companies about recent blockchain activity it…
Cybersecurity’s Crucial Role Amidst Escalating Financial Crime Risks
In an era of escalating financial crimes, the spotlight shines brightly on the rising concerns in the realm of cybersecurity. According to a recent survey , a staggering 68% of UK risk experts anticipate a surge in financial crime risks…