By Joao Correia The persistent neglect of patching legacy systems has long affected critical infrastructure as well as nearly all major industries. At a time when the cyberthreat environment is teeming with new malware variants, cybercriminal groups and data-hungry hackers,…
Category: Cybersecurity Insiders
To Navigate Cyberattacks Effectively, Start with Empathy
By Ric Opal, Principal and National Leader of IT Solutions and Strategic Partnerships at BDO Digital From username, password, and credit card hacking to other forms of authentication attacks, Microsoft blocked, on average, 4,000 identity authentication threats every second in…
E-commerce Security in the Cloud: Safeguarding Data in the Holiday Season
By Dan Benjamin, CEO and Co-Founder, Dig Security The holiday sales season is the most important time of year for e-commerce retailers, representing a time of heightened consumer activity and potential revenue growth. Retailers are forced to maintain security while balancing the consumer…
A new era of age verification
There are many scenarios where we might need to prove our age – from ordering an alcoholic drink in a bar, to applying for a job, buying medication, or accessing age restricted content online. And while most people currently use…
Blacksuit Ransomware linked to Royal Ransomware
As per an advisory from the FBI and US-CISA, a forthcoming ransomware variant is set to enter the cybersecurity landscape, marking itself as a rebrand or offshoot of the Royal Ransomware gang, notorious for purportedly amassing around $275 million in…
Cyber Security news headlines trending on Google
Morgan Stanley Agrees to $6.5 Million Settlement with Six States Over Data Breach Global financial services giant Morgan Stanley has reached a settlement of $6.5 million with six North American states for its failure to safeguard customer data, resulting in…
The Cyber Resilient CEO: Navigating the Digital Landscape with Vigilance
In an era dominated by rapid technological advancements and an ever-evolving digital landscape, the role of a CEO has transcended beyond traditional business acumen. Today, a new breed of leaders is emerging – the cyber resilient CEO. But what exactly…
How to Pitch Cybersecurity Packages
By Brandi Crown, Director of Sales at Syncro If you have a tool that has proven to improve threat protection for your clients, but you don’t know how to sell it effectively, it’s a lose-lose for everyone. Your client misses…
An Inside Look at Ransomware’s Record-Breaking Pace in 2023
Ryan Bell, Threat Intel Manager, Corvus Insurance There is still more than one month left in the books for 2023, and it’s safe to say that once we flip the calendar to January, we will have also closed the books…
FBI and CISA issues alert against Rhysida Ransomware Gang
Rhysida Ransomware, operating since December 2022, has garnered attention from the US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI). Both agencies have issued warnings about this ransomware, noting its unique capability to delete itself…
ALPHV Ransomware gang files SEC Complaint against a victim
In a groundbreaking development in the realm of ransomware, ALPHV, also known as BlackCAT, has taken an unprecedented step by filing a complaint with the Security and Exchange Commission (SEC) against a victim who failed to adhere to the stipulated…
AI In Cybersecurity: Exploring the Opportunities and Dangers
By Dr. Madhu Shashanka, Chief Data Scientist and Co-Founder, Concentric AI If you’ve been keeping with the news surrounding generative artificial intelligence (AI), you’re probably in one of two camps – optimistic or concerned. In the rapidly evolving world of…
UK labels AI Tools as a cyber threat to National Elections
Britain has identified the continued use of AI tools as a significant cyber threat to the upcoming national elections slated for January 2025. Emphasizing the increasing difficulty for security experts to track and neutralize these threats, particularly in the context…
Stream Security Takes on CloudSecOps
The cybersecurity industry has been rapidly transforming for well over a decade. With threat actors rapidly finding unique ways to expose vulnerabilities, organizations are constantly seeking the latest technology to protect their proprietary information, such as Intrusion Detection Systems (IDS)…
LockBit hiring young hackers to launch ransomware attacks
LockBit, a notorious ransomware gang, has consistently targeted major corporations, with victims ranging from Boeing and DP World to the Industrial and Commercial Bank of China and Allen and Overy. Recent revelations suggest that the hackers achieved their success by…
Navigating Cloud Security Compliance: Understanding FedRAMP, StateRAMP, and Key Differences
In the ever-evolving landscape of cloud computing, ensuring robust security measures is paramount. Federal and state governments, along with private enterprises, adhere to specific security compliance frameworks to safeguard sensitive data. This article will delve into the differences between FedRAMP,…
India to make CyberShield mandatory for Vehicles
India has emerged as a trailblazer in proactively addressing the looming threat of cyber attacks on domestically manufactured vehicles. This initiative aligns with guidelines established by the United Nations Economic Commission for Europe World Forum for Harmonization of Vehicle Regulation,…
PlexTrac Establishes UK and European Operations
Dedicated Organization Established to Deliver the Highest Level of Technical and Business Support to Existing Customers, Prospects and Partners LONDON, England, November 2, 2023 (Newswire.com) – PlexTrac, a pioneer in streamlining offensive security and pentest planning, reporting, and findings delivery, today…
Ransomware attack on Huber Heights drives it into Emergency
Huber Heights, a picturesque city in Ohio, found itself in a state of emergency due to a sophisticated ransomware attack that targeted several of its departments. City Manager Rick Dzik assured residents that efforts were underway to resolve the issue…
How Financial Services Firms Can Use Application Security Posture Management (ASPM) to Save Costs and Fill Cloud Security Posture Management (CSPM) Coverage Gaps
By Anna Tang, Information Security Officer, Data Theorem In recent years, financial services organizations have increasingly moved their applications and infrastructure to the cloud to take advantage of its scalability, flexibility, and cost-effectiveness. However, this shift to the cloud has…
Generative AI: Bringing Cybersecurity Readiness to the Broader Market
By Benjamin Preminger, Senior Product Manager, Cybersixgill “You can’t get good help nowadays.” The adage is true for many professions, but exceedingly so for cybersecurity. While cyber-attacks continue to grow in quantity and sophistication each year, most organizations are ill-prepared to defend…
A Guide to Handling SAP Security Breaches
By Christoph Nagy, SecurityBridge So your SAP system has been breached. While this is not an unusual occurrence, it’s still a serious issue that needs your immediate attention. Since SAP is one of the most widely used systems by organizations…
Eight 8 WhatsApp message links that you should never click on
Staying active on social media is a popular trend, and WhatsApp is one of the prominent platforms facilitating connections with both businesses and loved ones. However, security experts warn that, like any online service, this Facebook-owned subsidiary is susceptible to…
Employment Scams On The Rise: What Can HR Do To Mitigate Them?
Ani Banerjee, Chief Human Resources Officer, KnowBe4 Bad news. Your organization just announced a major restructuring, making your role “redundant”. You update your LinkedIn profile, using the #OpenToWork hashtag, and announce to prospective recruiters that you’re on the market, actively searching…
Cybersecurity horror stories and how to avoid them
By Andy Syrewicze, Microsoft MVP and Technical Evangelist, Hornetsecurity 2023 has seen a host of malicious cyber-attacks targeting a range of organisations from police forces to healthcare providers. The threat landscape has transformed drastically across the course of my career,…
DP World Cyber Attack puts Australia on High Alert
Over the recent weekend, DP World Australia, a prominent maritime freight operator, fell victim to a sophisticated digital attack, prompting swift action from authorities. In response to the breach, access to the corporate network was temporarily halted, and operations at…
Enhancing Ransomware Defense through Micro-Segmentation of Networks
In an era where cyber threats continue to evolve in sophistication, organizations are increasingly turning to advanced security measures to protect their digital assets. One such strategy gaining prominence is micro-segmentation of networks, a powerful approach that proves invaluable in…
It’s Never Too Soon to Begin Thinking About Your 2024 Cybersecurity Journey
John Siegel, Director of Strategy, Field CTO, Axis Security Was it me, or did 2023 roll by fast? It feels like it was a blur to me. The end of the year is here and it’s time to pause, take stock, and…
Cyber Attack news headlines trending on Google
The Washington State Transportation website and its mobile app experienced a disruption due to a sophisticated cyber attack earlier this week. According to information shared on the X, WSDOT ferry vessel watch social media platform, both online freight services and…
What is the Diamond Model of Intrusion Analysis – And How to Use the Framework
The Diamond Model of Intrusion Analysis is a framework used in cybersecurity to analyze and understand cyber threats and intrusion events. It provides a structured way to break down and analyze cyber incidents, helping security professionals and incident responders to…
How the AI era has fundamentally altered the cyberthreat landscape
By Matt Lindley, COO and CISO at NINJIO The AI mania over the past year has been illuminating in many ways. Despite the emergence of exciting new technology such as generative AI tools that can produce a vast library of…
Cyber Attack on US Bank forces it to transit data via USB Sticks
In a world plagued by numerous cyberattacks and their devastating aftermath, a recent incident involving the Industrial & Commercial Bank of China (ICBC) has drawn significant attention. ICBC, one of the world’s largest banks, was forced to resort to a…
What is a diamond model of Intrusion Analysis
The Diamond Model of Intrusion Analysis is a framework used in cybersecurity to analyze and understand cyber threats and intrusion events. It provides a structured way to break down and analyze cyber incidents, helping security professionals and incident responders to…
Why you need ZTNA with Desktops-as-a-Service
By Karen Gondoly, CEO of Leostream As the world increasingly works remotely, Desktops as a Service (DaaS) are becoming ubiquitous in many industries. Remote workers need access to cloud and on-premise data and applications, and delivering that access in a…
Eight Ways to Bolster Your Cybersecurity Resources Without Blowing Your Budget
By Karen Lambrechts, Lansweeper IT security breaches are becoming more frequent and costly. According to IBM Security’s Cost of a Data Breach Report 2023 UK organisations shell out an average of £3.4m for data breach incidents. There isn’t a CISO…
Is Microsoft ChatGPT grappling with DDoS Cyber Attack
In recent days, Microsoft’s generative AI tool, ChatGPT, has been experiencing connectivity problems. The official message on the website indicates that their servers are operating at full capacity. However, an article published by Bloomberg suggests that the technology giant’s AI…
How can a CEO or a CTO lose their jobs on ransomware attacks
In accordance with the newly introduced federal guidelines, the responsibility for a company facing a ransomware attack is now placed squarely on the shoulders of its CTO or CEO. Legal repercussions may be initiated against the targeted business if it…
Ten 10 ways Senior Citizens and Disabled can stay cyber safe and secure online
Online banking and services help disabled and senior citizens gain access to valuable services from the comfort of their homes, that otherwise can only be availed on a physical note. However, with the increase in digitalization, hackers are seeing such…
Can a Brute Force Attack Be Reversed?
Brute force attacks are a common and often successful method employed by hackers to gain unauthorized access to various systems, accounts, or data by systematically trying all possible combinations of passwords or encryption keys. While it may seem like the…
Fresh Optus Australia server disruption not caused by a Cyber Attack
Optus, the Australian counterpart of Singapore Telecommunications, faced a significant disruption on Wednesday, leading to widespread service outages affecting millions of customers. While some initially speculated that the outage was the result of a national emergency or a state-sponsored attack,…
Marina Bay Sands Singapore suffers Information Security Breach
Marina Bay Sands (MBS), the renowned resort and luxury hotel situated in Singapore, recently experienced a data breach that impacted the personal information of more than 665,000 individuals associated with the MBS Loyalty Program. The breach occurred in mid-October of…
Cerber Ransomware hackers target Atlassian Confleunce servers
A recent study conducted by the cybersecurity firm Rapid7 has revealed that multiple ransomware groups are actively targeting vulnerabilities in Atlassian Confluence Servers. One such criminal group, responsible for the distribution of Cerber Ransomware, is exploiting these vulnerabilities in Confluence…
Palo Alto Networks acquired Talon Cyber Security
Israel-based browser-based startup Talon Cyber Security has recently been acquired by the networking giant Palo Alto Networks. Palo Alto Networks has been actively integrating new technology into its existing products. Remarkably, this acquisition was not hindered by the ongoing conflict…
Cyber Attack news headlines trending on Google
1. Shimano, a cycle component manufacturing company, fell victim to a ransomware attack in which hackers managed to steal approximately 4.5 terabytes of sensitive business-related information. The incident is believed to be the work of the LockBit Ransomware gang and…
Exploring Different Types of Cybersecurity: Protecting the Digital Realm
In our increasingly interconnected world, the importance of cybersecurity cannot be overstated. The rapid advancement of technology has led to more sophisticated cyber threats, making it essential for individuals, businesses, and governments to safeguard their digital assets. Cyber-security encompasses a…
QR Codes are a Security Blindspot
By Mary Blackowiak, Director of Product Management and Development, AT&T Business Whether at the grocery store, eating dinner at a restaurant, locating a gate at the airport, gaining entry to an event, or even watching TV—QR codes are popping up…
Ransomware hits Infosys, Ace Hardware and Henry Schein
1.) A recent cyber attack targeted Infosys subsidiary, Infosys McCamish Systems, which was initially detected last week but only officially acknowledged this Tuesday. According to sources within our Cybersecurity Insiders, this incident appears to involve a ransomware variant, with further…
Palo Alto Networks acquires Dig Security n Accenture purchases Innotec Security
Palo Alto Networks, a cybersecurity company based in California, has officially announced its acquisition of the security startup ‘Dig Security,‘ although the exact purchase price remains undisclosed. The announcement comes after weeks of speculation on Reddit, suggesting that Dig initially…
What is data security posture management
Data Security Posture Management (DSPM) is a comprehensive approach and set of tools and practices that organizations use to assess, manage, and improve their data security posture. It involves monitoring, evaluating, and enhancing data security measures to ensure the confidentiality,…
Follow these cybersecurity tips while shopping for this Christmas 2023
Christmas 2023 is swiftly approaching, and many have already begun their lists of gifts for loved ones this holiday season. While some still adhere to the tradition of in-person store visits for their shopping, a growing number are opting for…
Samsung Galaxy users to get new Auto Blocker Mobile Security
Samsung Galaxy users who utilize either 5G or 4G models are about to receive an exciting new feature that grants them enhanced control over their devices. The company is gearing up to introduce “Auto Blocker” through the latest update via…
Weighing the Risks and Rewards of Generative AI for Business
by Matt Cloke, CTO at Endava Generative AI is poised to unleash the next wave of productivity, transform roles and boost performance across functions such as sales and marketing, customer operations and software development. According to a recent report by…
The Imperative of Accessibility in Security Awareness Training
by Michal Gal, Head of Product, CybeReady Cybersecurity, in an age of ubiquitous digitalization, has become a top priority for organizations worldwide. Integral to a strong cybersecurity posture is the ability to train all members of an organization, ensuring they…
10 ways to know your smart phone has spying malware
Numerous world leaders have expressed concerns regarding espionage-related malware being surreptitiously planted on their personal devices by their adversaries. This clandestine practice aims to gather classified information or monitor their activities. Apple Inc. issued a statement yesterday, urging iPhone users…
Trending Cybersecurity News headlines on Google
Apple dismisses political controversy over its security alert Apple Inc has released a statement acknowledging attempts by state-sponsored actors to breach the devices of its users in various countries, including India. However, the company distanced itself from the ongoing espionage…
Top Cloud Misconfigurations Leading to Cloud Data Breaches
As organizations increasingly migrate their operations to the cloud, the security of their cloud infrastructure becomes a paramount concern. While cloud services offer numerous benefits, mis-configurations in cloud environments can inadvertently expose sensitive data and lead to catastrophic breaches. In…
Seventh-annual Hacker-Powered Security Report Reveals Hackers’ Plans for GenAI, Bounty Milestones and More
HackerOne has just released its seventh-annual Hacker-Powered Security Report, based on data from its vulnerability database, views from HackerOne customers and more than 2,000 hackers on the platform. The goal in benchmarking hackers is to gain insight into their perspective on…
Generative AI and Cybersecurity in a State of Fear, Uncertainty and Doubt
by Jason Rebholz, Chief Information Security Officer, Corvus Insurance Organizations are finding innumerable ways to incorporate generative artificial intelligence (GenAI) and large language model (LLM) technologies to speed up processes, gain efficiencies, eliminate repetitive, low-value tasks and enhance knowledge, among other uses.…
AI CyberSecurity Risks: Equip Your Employees To Think Like a Hacker
By Eric Jacksch, CPP, CISM, CISSP, ELB Learning Cybersecurity Consultant The rapid expansion of AI has graced us with what seems like the gift that keeps on giving. We’ve been able to turn our words into works of art, effortlessly…
Generative AI: The Unseen Insider Threat
by Steve Povolny, Director, Security Research at Exabeam Artificial intelligence, or AI, as it’s commonly known, is all the rage these days. The widespread availability of free generative AI tools like ChatGPT has allowed the technology to be embraced by…
Navigating Security, Business Continuity, Through a Downturn
Steve Durbin, Chief Executive, Information Security Forum With inflationary pressures mounting and downturn fears hovering, it’s natural for organizations to scale back on their overall spending, including cybersecurity. After consecutive years of double-digit growth, cybersecurity spending appears to be slowing down mainly because CISOs…
The Evolution of Financial Fraud
By Greg Woolf, CEO of FiVerity The marriage of fraud and artificial intelligence (AI) is lethal. Right now, fraudsters are upping their games, leveraging new and innovative tools such as ChatGPT and Generative AI to wreak havoc on the financial…
India witnesses biggest data breach of Aadhaar details via ICMR
Aadhaar, the unique identification number issued to every Indian citizen, has recently made headlines for all the wrong reasons. There are alarming reports suggesting that the personal information of approximately 815 million citizens was illicitly accessed by hackers through the…
Ransomware news trending on Google
1.) A ransomware group known as “Play” has recently issued a concerning statement. They have threatened to release the personal details of more than 8,600 Dallas County employees on the dark web unless their ransom demands are met. To add…
Google App turns into malware for many on Smart Phones
The Google app and its synchronized applications, including Maps and Gmail, offer a world of possibilities to users. However, a peculiar situation has arisen, with certain smartphones identifying the Google app as potential malware and warning users against its usage.…
A New Tactic to Combat Cyber Warfare: Diversity as Digital Defense
By Reinier Moquete, Founder and CEO, CyberWarrior.com Attackers are constantly evolving the tools they use, learning how defenders are protecting data and finding the gaps to get in. Defenders need to plug all the holes, while attackers only need to…
Privacy in the Age of AI: Strategies for Protecting Your Data
Artificial intelligence is no longer just the stuff of science fiction; generative AI tools are seeing massive adoption rates. Unsurprisingly, the marketing and advertising industry has embraced AI-driven tools with the most enthusiasm. According to the latest data from January…
Beware of Data Security Monsters Lurking in the Shadows this Halloween
Claude Mandy, Chief Evangelist at Symmetry Systems The Halloween season is filled with fear of ghosts and goblins, but it’s not only these spooky creatures that should cause concern. The digital world can feel like it has a few monsters…
LockBit Ransomware Group Targets Boeing with Data Threat
LockBit, a notorious ransomware gang, has recently set its sights on the aerospace giant Boeing, initiating a double extortion attack and threatening to unveil stolen data on or after November 2, 2023. In a brazen move, the criminal group has…
Kaspersky Uncovers ‘Operation Triangulation,’ a Threat to iOS Devices
Russian cybersecurity firm Kaspersky has uncovered a new threat called ‘Operation Triangulation,’ revealing that it infects iOS devices, including iPads and iPhones. This revelation came during the Security Analyst Summit (SAS) in Phuket, where Kaspersky also released a technical paper…
Ten Ways to Protect PCs and Routers from Holiday Season Cyber Attacks
The holiday season is a time of celebration, giving, and joy, but it’s also a time when cyber-criminals are more active than ever. With increased online shopping, travel bookings, and social interactions, the opportunities for cyber attacks are abundant. To…
Email Security in the Remote Work Era
“Is your email safe? Think again.” Every day, we send and receive over 333 billion emails worldwide, with the average employee managing 120 of them daily. But, did you know that 94% of cyberattacks start with a malicious email? In…
Five Canada Hospitals hit by cyber attack, ransomware suspected
Transform, a prominent IT, accounts, and managed service provider dedicated to providing digital support to over five hospitals in Ontario, Canada, is currently under suspicion of being targeted in a cyber attack. Unconfirmed sources suggest that the hospital services have…
Managing Cloud Sprawl: A Key Defense Against Cybersecurity Threats
The adoption of cloud computing has revolutionized the way organizations store, process, and manage data. It offers scalability, flexibility, and cost-efficiency. However, with the benefits come certain challenges. Cloud sprawl is one such challenge that not only impacts an organization’s…
Hunter International Ransomware Group hacks plastic surgery clinic
A newly emerging ransomware group, known as Hunter International, has recently targeted a plastic surgeon’s office, raising concerns by threatening to expose sensitive photographs of patients who have undergone facial surgery procedures at the clinic’s branches in Beverly Hills and…
Ransomware news headlines trending on Google
BHI Energy recently issued a statement revealing that its servers fell victim to a ransomware attack orchestrated by a group known as Akira in June of this year. The breach was not detected until July. The attackers gained unauthorized access…
Cybersecurity month: Why we need to talk about online identities
Cybercrime is something we can no longer avoid. On a regular basis, we hear about companies we have used experiencing a data breach, or a friend or family member who has fallen victim to online fraud. We may even fall…
How to craft a password meticulously
In today’s digital landscape, many online service providers offer the convenience of using a single password across multiple services. A prime example of this is Google, which allows users to access various platforms like Gmail, Drive, Google Photos, Maps, Sheets,…
Microsoft invests $5 billion to bolster Cyber Shield of Australia
Australian Prime Minister Anthony Albanese has unveiled Microsoft’s Cyber Shield, a substantial commitment to bolster the nation’s cybersecurity infrastructure with a $5 billion investment. The announcement was made during the Prime Minister’s visit to the Australian embassy in Washington, D.C.,…
The Role of FPGAs in Post-Quantum Cryptography and Cyber Resilience
By Mamta Gupta, Director of Security and Communications Segment Marketing, at Lattice The rise of both 5G and the Internet of Things (IoT) has created a complex and highly distributed network of devices that are increasingly vulnerable to cyberattacks. In…
The Role of FPGAs in Post-Quantum Cryptography and Cyber Resilience
By Mamta Gupta, Director of Security and Communications Segment Marketing, at Lattice The rise of both 5G and the Internet of Things (IoT) has created a complex and highly distributed network of devices that are increasingly vulnerable to cyberattacks. In…
Amazon Web Services launches European Sovereign Cloud
Amazon Web Services (AWS), the American technology giant, has launched an exclusive European Sovereign Cloud to meet the needs of its European customer base. This new cloud infrastructure will operate independently and is designed to address the evolving concerns regarding…
Ten compelling reasons to assert cloud sprawl can lead to cybersecurity concerns
Cloud sprawl can indeed lead to cybersecurity concerns for organizations. Here are ten reasons why: 1.Increased Attack Surface: More cloud resources mean more potential entry points for attackers to exploit, as each resource represents a potential vulnerability. 2. Misconfigurations: With…
American healthcare looses $78 billion to ransomware attacks
A recent report by Comparitech reveals that the healthcare sector in the United States has incurred staggering losses of $78 billion due to ransomware attacks. These losses are primarily attributed to the significant downtime experienced by healthcare companies over the…
Why EDRs and other preventative measures cannot stop ransomware
As ransomware attacks continue to increase in frequency and sophistication, organizations are searching for ways to prevent them from occurring. One common approach is to implement Endpoint Detection and Response (EDR) solutions and other preventative measures. While these tools can…
Vietnam hackers start stealing Facebook Credentials
Facebook, the world’s leading social networking platform, has recently made headlines for all the wrong reasons. The company led by Mark Zuckerberg has found itself in the news due to a troubling trend: it has become a target for cyber…
The Evolution of Access Control: A Deep Dive with PlainID’s Gal Helemski
Access control is at the heart of IT security, evolving over the years to adapt to the rising challenges and demands of an ever-complex digital landscape. One company at the forefront of this evolution is PlainID. In a recent conversation…
Insider Threats nurtured for circumnavigating data centers
A few days ago, our Cybersecurity Insiders reported an alarming trend: hackers are actively persuading employees of corporate firms to surrender their login credentials, providing a gateway for unauthorized network access. Now, sources on Telegram are forecasting an escalation in…
Top 3 Google trending news headlines related to Cyber Attacks
International Criminal Court suffers espionage related cyber attack The International Criminal Court (ICC) has officially determined that the recent cyberattack on its digital systems, which occurred last month, was an act of espionage with the intent to compromise sensitive court…
How Maritime companies can shield from Ransomware
In today’s digital age, ransomware attacks have become a grave concern for industries across the world. Maritime companies, with their extensive reliance on digital systems and global operations, are no exception. Protecting against ransomware is of utmost importance in safeguarding…
Best practices to protect data in remote work environments
By Allen Drennan, Co-Founder & Principal, Cordoniq Addressing the security challenges associated with remote work is critical for today’s Chief Information Security Officers (CISOs). Along with data breaches and ransomware attacks, another top concern is whether company or customer data…
The Evolution of Security: From Signatures to Deep Learning
In cybersecurity, the arms race between defenders and attackers never ends. New technologies and strategies are constantly being developed, and the struggle between security measures and hacking techniques persists. In this never ending battle, Carl Froggett, the CIO of cybersecurity…
A quarter of American populace have had their health data compromised
Data breaches in the healthcare sector in the United States have become increasingly common, with one in four individuals falling victim to cyberattacks this year, according to a survey. Atlas VPN, an internet security firm, published these alarming statistics in…
Getting your organisation post-quantum ready
While quantum computing is still very much in its early stages, it’s important that companies are already thinking about this evolving technology – and more importantly implementing and stress testing much needed solutions suitable for a post-quantum world. In this…
Netflix password sharing crackdown yields excellent results
For all those who were accustomed to sharing their Netflix passwords with friends and family, here’s an important update on how the company has taken action against this practice. Netflix released an official statement last Wednesday, indicating that its efforts…
The Unyielding Importance of Cybersecurity in Times of Recession
In times of economic recession, as budgets tighten and organizations face financial constraints, it can be tempting to cut corners in various aspects of business operations. However, one area that should never experience budget reductions is cybersecurity. In fact, maintaining…
Maritime Companies Increasingly Paying Ransoms Amidst Ransomware Surge
In the double extortion strategy, cybercriminals first exfiltrate sensitive data from the victim’s servers and then encrypt the data, making it inaccessible. They then demand a ransom for both the decryption key and the assurance that they will not release…
Interesting cyber attack headlines trending on Google for this day
“Ukraine Cyber Alliance Takes Down Trigona Ransomware Gang, Wipes Their Data Clean” In recent times, we’ve witnessed numerous headlines about ransomware groups wreaking havoc on corporate networks. However, this time, the ‘Ukraine Cyber Alliance,’ a group of activists, managed to…
Cyber attack on payment systems could cost $3.5 trillion loss to the world
Have you ever contemplated the potential ramifications of a highly sophisticated cyberattack targeting global payment systems? Lloyds of London, a prominent provider of insurance services, has undertaken an analysis that suggests the world could face staggering losses of up to…
Trending cyber attack related news headlines on Google
IBM confirms Johnson & Johnson Data Breach with 631k affected IBM has officially confirmed a data breach involving Johnson & Johnson, impacting approximately 631,000 individuals. This breach occurred on the servers of Johnson and Johnson’s patient medication platform. While the…