Category: Cybersecurity Insiders

YouTube being used by hackers to spread Malware

When you’re casually browsing through YouTube channels and encounter a tempting link in the description, think twice before clicking. There’s a rising trend where these links can lead unsuspecting users straight into the jaws of malware. As the demand for…

2024 Cybersecurity Excellence Awards – Extended Deadline

Great news: By popular demand, we extended the deadline for the 2024 CYBERSECURITY EXCELLENCE AWARDS until April 27,2024. In the complex and dynamic world of cybersecurity, excellence often goes unnoticed. That’s where the Cybersecurity Excellence Awards come in. This isn’t just…

How information can be protected in hotel data breaches

In today’s flexible holiday landscape, where travelers enjoy getaways at various times of the year, the hospitality industry thrives. However, recent incidents like the cyber-attack on Omni Hotels underscore the importance of safeguarding guest data. Here are some key measures…

2024 Insider Threat Report Trends, Challenges, and Solutions

Introduction   Insider threats, driven by personal motivations and enabled by the rapid evolution of technology and changing  hybrid work environments, present a critical challenge to organizational security. Addressing these threats  necessitates a sophisticated, multi faceted approach that combines advanced…

Will Quantum Computing Change the Way We Use Encryption?

[By Jerry Derrick, Camelot Secure] Today, encryption is a cornerstone of our cybersecurity practices. It protects everything from cell phones and SMS messages to financial transactions and intellectual property. However, a new challenge in the complex landscape of encryption has…

Apple issues warning against Mercenary Spyware

Apple Inc has recently updated its threat notification system to include alerts for Mercenary Spyware targeting individuals and companies. Previously, starting from March 2021, Apple had been issuing alerts to users whose devices were targeted by state-sponsored attacks, a response…

The ClickOps Era Has Begun—Here’s a Quick Primer

[By Prashanth Nanjundappa, VP, Product Management, Progress] In the last decade, the codification and spread of DevOps best practices have transformed the day-to-day workings of businesses worldwide. Where development and operations were once needlessly siloed, they are now more closely…

Google top trending cybersecurity news headlines

Greylock Mckinnon Associates Data Breach Exposes Sensitive Information of 340,000 Individuals A significant cybersecurity incident has affected a defense contractor contracted by the Department of Justice (DoJ), resulting in the exposure of sensitive data belonging to over 340,000 individuals. The…

Google workspace to use AI for Data Security

Google has recently announced a significant upgrade to its Workspace platform, integrating cutting-edge Artificial Intelligence (AI) technology to enhance meetings and bolster data security. With this advancement, Gemini, Google’s AI-powered assistant, is set to revolutionize the experiences of over 3…

Ransomware threat to diminish in this year 2024

Exciting news arrives amidst the relentless surge of ransomware assaults that have plagued individuals and corporations, escalating into double and triple extortion schemes, instigating apprehension among internet users. However, a glimmer of hope emerges from the latest findings of a…

Cybersecurity Incidents Making Headlines on Google

Panera Bread Falls Victim to Ransomware Attack: Panera Bread, a popular chain of restaurants, recently faced a significant setback as it was targeted by a ransomware attack leading to a week-long IT outage. The attack, which was identified on March…

Avoiding Cloud Breaches: Top 5 Misconfigurations to Watch For

In today’s digital landscape, the migration to cloud computing has revolutionized how businesses operate, offering unparalleled flexibility, scalability, and efficiency. However, with great power comes great responsibility, and the improper configuration of cloud environments can lead to devastating data breaches.…

Hoya suffers a suspected ransomware attack

HOYA Corporation, a prominent Japanese brand known as the world’s second-largest optical manufacturer, has recently been targeted in a cyber attack suspected to be ransomware-related. Initially attributed to a system failure by company authorities, subsequent disruptions in other business subsidiaries…

Stream.Security Releases Suite of Next-Gen Features

Advanced Exposure Investigation and AI-Powered Remediation Capabilities Now Available    TEL AVIV – March 28, 2024 – Stream.Security, a leading platform for cloud solutions specializing in real-time digital twin technology, announced today the release of new advanced threat investigation and…

FBI shares some valuable insights on ransomware

The FBI, America’s premier law enforcement agency, has released a comprehensive report shedding light on the ongoing ransomware threat landscape. Here’s a summary of the key insights: Intermittent Encryption Tactics: Notably, the report highlights a common tactic among the top…

Seven tips to find spyware on a smart phone

To determine if your phone has spyware installed, you can follow these steps: 1.Check for Suspicious Apps: Review the list of installed apps on your phone. Look for any unfamiliar or suspicious apps that you don’t remember downloading. Spyware often…

Omni hotels hit by a possible ransomware attack

Omni Hotels, a Texas-based resort chain, has announced that some of its IT systems are experiencing technical difficulties, resulting in slowed or intentionally shut down digital services. While the incident is still under investigation, there are indications that it may…

Exploring the Threat of Data Poisoning in Cybersecurity

In today’s digitally driven world, data is often referred to as the new currency. With the exponential growth of data collection and utilization, ensuring its integrity and security has become paramount. However, amidst the efforts to safeguard data, a lesser-known…

Know the significance of World Cloud Security Day

Many individuals within the cloud industry may not be aware of World Cloud Security Day, which has been observed since 2019 on April 3, 2024. This significant day serves as an opportunity to raise awareness about the importance of safeguarding…

Ransomware criminals target backups for assured ransom

In recent times, the importance of maintaining efficient data backups as a defense against ransomware attacks has been repeatedly emphasized by security experts and law enforcement agencies. However, what happens when even these backups fall victim to encryption or deletion?…

The Future of Defense in an Era of Unprecedented Cyber Threats

[By Darren Guccione, CEO and Co-Founder, Keeper Security] Cyber attacks are becoming increasingly sophisticated as malicious actors leverage emerging technology to conduct, accelerate and scale their attacks. With AI-powered attacks at the helm, today’s IT and security leaders must contend…

Cybersecurity news headlines trending on Google

AT&T Acknowledges Data Breach AT&T, one of America’s leading telecom brands, has confessed to a significant data breach, revealing that sensitive information pertaining to millions of customers has been leaked onto the dark web. This breach has raised concerns about…

Google new Password Manager raises security concerns

Google, the pioneering service that originated with Gmail and marked its 20th anniversary on April 1st, 2024, has unveiled a new feature named ‘Password Manager.’ This service allows users to seamlessly transfer their passwords from their mobile devices to other…

What is innovative frictionless security

Innovative frictionless security refers to cutting-edge approaches and technologies that prioritize both security and user experience by minimizing or eliminating the barriers and inconveniences traditionally associated with security measures. At its core, frictionless security seeks to strike a balance between…

Meet the Phishing service platform named Darcula

Cybersecurity analysts at Netcraft, an internet service company based in London, have recently uncovered a sophisticated phishing platform dubbed ‘Darcula.’ This platform, known as a phishing-as-a-service (PhaaS) operation, provides users with template-based guidance for setting up phishing websites. What sets…

Hot Topic customers targeted by Credential Stuffing attacks

Hot Topic, the American fashion retailer, experienced two waves of credential stuffing attacks in November of the previous year. Investigations have revealed that these attacks resulted in the leakage of customer information, including partial payment data. Credential stuffing involves hackers…

NHS patient data published on the Dark Web

In a concerning development, a well-known ransomware collective known as INC Ransom has recently disclosed a portion of pilfered data linked to the UK’s National Health Service (NHS) on the obscure corners of the internet known as the dark web.…

The human-AI partnership: a guide towards secure coding

[Pieter Danhieux Co-Founder and CEO, Secure Code Warrior] The doomsayers are, so far, losing the argument. The panic around AI replacing humans has been countered with a new narrative: “Let AI redefine your job rather than replace it.” According to…

Ransomware attack on Big Issue and University of Winnipeg

The Qilin Ransomware group is under scrutiny for breaching the servers of the UK-based newspaper ‘The Big Issue Group.’ Reports indicate that the perpetrators successfully accessed confidential data from the victim and are now holding the entire database hostage, encrypting…

New Zealand accuses China for hacking the Parliament

After the United Kingdom’s purported accusation against China of launching a cyber attack on its Electoral Commission in 2021, allegedly aimed at stealing data pertaining to over 40 million voters, New Zealand (NZ) government has directly pointed fingers at China…

Medusa Ransomware group demands $700k from victims

Tarrant Appraisal District (TAD), a governmental entity in Texas, has made headlines due to a sophisticated cyber attack suspected to be orchestrated by the Medusa Ransomware group. The incident came to light on March 24th, 2024, prompting an emergency meeting…

Understanding the Various Types of DDoS Attacks and Their Implications

In today’s interconnected digital world, Distributed Denial of (DDoS) attacks have emerged as a significant threat to online businesses, organizations, and even individuals. These attacks can disrupt essential services, compromise sensitive data, and incur substantial financial losses. Understanding the different…

Over 40m UK voters personal data breached in hack by China

In an unprecedented move, the United Kingdom’s government is poised to publicly accuse China of orchestrating a cyber breach into its Electoral Commission’s database. The breach, occurring between August 2021 and October 2022, saw over 40 million voter records compromised.…

Will AI augment or annex cybersecurity jobs?

By Jamal Elmellas, Chief Operating Officer, Focus-on-Security Generative AI is expected to impact 60% of jobs in advanced economies like the UK according to the International Monetary Fund (IMF), half of which will gain from enhanced productivity while the other…

Privacy concerns makes Airbnb ban security cameras indoors

Installing CCTV cameras has become a common practice in today’s society, offering a sense of security and providing potential video evidence in legal situations. However, concerns over privacy have emerged as some cameras are perceived as overly intrusive. In response…

Russia bans Microsoft followed by Amazon and Google

Russia implemented a sweeping ban on Microsoft Cloud services on March 20th, with plans to extend the prohibition to Google and Amazon web services in the coming weeks. While security analysts cite national security concerns as the primary motive, trade…

Unraveling the Cyber Threats Lurking Behind QR Codes

QR codes, once a simple tool for scanning and accessing information swiftly, have become a ubiquitous feature in our digital landscape. From restaurant menus to promotional materials, these square barcodes offer convenient access to websites, apps, and multimedia content with…

Now FCC endorses IoT products with Cyber Trust Mark Logo

The Federal Communications Commission, or FCC, is on the verge of introducing a cybersecurity labeling system for Internet of Things (IoT) products. This initiative aims to provide consumers with a clear indication of which smart devices meet basic cybersecurity standards.…

Five Steps to Overcoming Cyber Complacency

[By Mike Toole, Head of IT and Security at Blumira] It’s no secret that news about breaches and cyberattacks emerge daily. As a result of this constant exposure, even the most dedicated professionals understandably experience “data breach fatigue” and become…

Kate Middleton Medical Record Data was hacked

The Princess of London, Kate Middleton, has been undergoing treatment for undisclosed health issues at ‘The London Clinic’ in recent weeks. However, reports from the Daily Mail suggest that hackers or a hacking group attempted to breach the medical data…

United Health spends $2 billion in ransomware recovery

UnitedHealth recently disclosed that it has disbursed approximately $2 billion to its healthcare subsidiaries affected by a ransomware attack detected last month. The company also announced plans to roll out medical claims preparation software to assist customers in managing payments…

CISA Hacked and over 70m files leaked online from AT&T database

In February of this year, the Cybersecurity and Infrastructure Security Agency (CISA) revealed that its systems had been compromised by hackers, exploiting vulnerabilities within Ivanti products utilized by the federal agency. According to a CISA spokesperson, flaws within Ivanti Connect…

Ransomware attack on Fujitsu Servers

Reports have surfaced indicating that a hacking group specializing in ransomware has breached Fujitsu Servers’ computer network, purportedly stealing sensitive data. Details remain sparse, pending the conclusion of a thorough investigation by the IT company. While Fujitsu has yet to…

Demystifying Serverless Security: Safeguarding the Future of Cloud Computing

Serverless computing has revolutionized the landscape of cloud computing, offering unparalleled scalability, flexibility, and cost-effectiveness. However, as organizations increasingly adopt server-less architectures for their applications, concerns about security have risen to the forefront. Understanding and effectively addressing these security challenges…

Google Chrome now offers phishing and malware protection

For those prioritizing a secure browsing experience, here’s some promising news: Google has announced that Chrome users utilizing the safe browsing mode will now receive automated protection against phishing, malware, and malicious sites. Google, renowned for its commitment to user…

Zscaler acquires Avalor for $350 million

Zscaler, a prominent player in cloud security, has made headlines with its recent acquisition of Israeli startup Avalor for a hefty $350 million. This move marks the third acquisition by Zscaler in recent times, following the purchases of Canonic for…

Ransomware news trending on Google

Alabama state websites down due to DDoS attacks Alabama state websites experienced a cyber disruption today as several government URLs were targeted by a sophisticated attack initially thought to be a variant of Ransomware but later identified as a Distributed…

Immutable data storage is last line of defense against ransomware

Ransomware attacks continue to escalate annually, prompting security analysts to advocate for strategies to combat the proliferation of malware. One recommended approach is the implementation of immutable data storage systems that are resistant to file-encrypting malware and can withstand sophisticated…

LockBit takedown surges Akira Ransomware Attacks

Following the takedown of the LockBit Ransomware group’s website in ‘Operation Cronos‘ by law enforcement agencies, there has been a notable surge in the activity of the Akira Ransomware group in recent weeks. This rise has been particularly pronounced since…

Organizations issue warning to Ransomware gangs about no money

In recent times, the landscape of cyber threats has been dominated by ransomware attacks, often involving double and triple extortion tactics. However, a new approach is emerging from publicly funded organizations, openly acknowledging their inability to pay ransoms and rendering…

Ransomware news headlines trending on Google

Ransomware Resilience: Evaluating UK’s Preparedness Strategy In the face of escalating ransomware attacks globally, no state or industry appears impervious to the threat posed by malicious malware. However, recent scrutiny suggests that the UK government’s approach to cybersecurity may be…

Cyber Attack on France government websites

Recently, hackers have shifted their attention to the government sector, with France’s government websites falling victim to sophisticated yet low-intensity cyber-attacks. A source from the office of France’s Prime Minister Gabriel Attal has suggested that these attacks on government servers…

Navigating Ransomware: Securin’s Insights and Analysis from 2023

[By Ram Movva, CEO, Securin] As ransomware attackers continue to evolve and adapt their techniques, organizations must refine and adapt their security strategies to stay ahead of these threats.    Human-augmented, actionable threat intelligence plays a critical role in every organization’s…

America to offer compensation to victims of Deep Fake AI content

Deepfake technology has become a significant concern, producing computer-generated images, videos, and audio that mimic real individuals, leading to the dissemination of misleading and often absurd content. In response, the United States government, led by President Joe Biden, is poised…

A Comprehensive Guide to Mobile Application Security Testing

With the rapid proliferation of mobile applications across various industries, ensuring the security of these apps has become paramount. Mobile application security testing is a crucial step in the development process to identify and mitigate vulnerabilities that could be exploited…