Category: Cybersecurity Insiders

Addressing Legacy System Patching Neglect

By Joao Correia The persistent neglect of patching legacy systems has long affected critical infrastructure as well as nearly all major industries. At a time when the cyberthreat environment is teeming with new malware variants, cybercriminal groups and data-hungry hackers,…

To Navigate Cyberattacks Effectively, Start with Empathy

By Ric Opal, Principal and National Leader of IT Solutions and Strategic Partnerships at BDO Digital From username, password, and credit card hacking to other forms of authentication attacks, Microsoft blocked, on average, 4,000 identity authentication threats every second in…

A new era of age verification

There are many scenarios where we might need to prove our age – from ordering an alcoholic drink in a bar, to applying for a job, buying medication, or accessing age restricted content online. And while most people currently use…

Blacksuit Ransomware linked to Royal Ransomware

As per an advisory from the FBI and US-CISA, a forthcoming ransomware variant is set to enter the cybersecurity landscape, marking itself as a rebrand or offshoot of the Royal Ransomware gang, notorious for purportedly amassing around $275 million in…

Cyber Security news headlines trending on Google

Morgan Stanley Agrees to $6.5 Million Settlement with Six States Over Data Breach Global financial services giant Morgan Stanley has reached a settlement of $6.5 million with six North American states for its failure to safeguard customer data, resulting in…

How to Pitch Cybersecurity Packages

By Brandi Crown, Director of Sales at Syncro If you have a tool that has proven to improve threat protection for your clients, but you don’t know how to sell it effectively, it’s a lose-lose for everyone. Your client misses…

FBI and CISA issues alert against Rhysida Ransomware Gang

Rhysida Ransomware, operating since December 2022, has garnered attention from the US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI). Both agencies have issued warnings about this ransomware, noting its unique capability to delete itself…

UK labels AI Tools as a cyber threat to National Elections

Britain has identified the continued use of AI tools as a significant cyber threat to the upcoming national elections slated for January 2025. Emphasizing the increasing difficulty for security experts to track and neutralize these threats, particularly in the context…

Stream Security Takes on CloudSecOps

The cybersecurity industry has been rapidly transforming for well over a decade. With threat actors rapidly finding unique ways to expose vulnerabilities, organizations are constantly seeking the latest technology to protect their proprietary information, such as Intrusion Detection Systems (IDS)…

LockBit hiring young hackers to launch ransomware attacks

LockBit, a notorious ransomware gang, has consistently targeted major corporations, with victims ranging from Boeing and DP World to the Industrial and Commercial Bank of China and Allen and Overy. Recent revelations suggest that the hackers achieved their success by…

India to make CyberShield mandatory for Vehicles

India has emerged as a trailblazer in proactively addressing the looming threat of cyber attacks on domestically manufactured vehicles. This initiative aligns with guidelines established by the United Nations Economic Commission for Europe World Forum for Harmonization of Vehicle Regulation,…

PlexTrac Establishes UK and European Operations

Dedicated Organization Established to Deliver the Highest Level of Technical and Business Support to Existing Customers, Prospects and Partners LONDON, England, November 2, 2023 (Newswire.com) – PlexTrac, a pioneer in streamlining offensive security and pentest planning, reporting, and findings delivery, today…

Generative AI: Bringing Cybersecurity Readiness to the Broader Market

By Benjamin Preminger, Senior Product Manager, Cybersixgill “You can’t get good help nowadays.” The adage is true for many professions, but exceedingly so for cybersecurity. While cyber-attacks continue to grow in quantity and sophistication each year, most organizations are ill-prepared to defend…

A Guide to Handling SAP Security Breaches

By Christoph Nagy, SecurityBridge So your SAP system has been breached. While this is not an unusual occurrence, it’s still a serious issue that needs your immediate attention. Since SAP is one of the most widely used systems by organizations…

Employment Scams On The Rise: What Can HR Do To Mitigate Them?

Ani Banerjee, Chief Human Resources Officer, KnowBe4 Bad news. Your organization just announced a major restructuring, making your role “redundant”. You update your LinkedIn profile, using the #OpenToWork hashtag, and announce to prospective recruiters that you’re on the market, actively searching…

Cybersecurity horror stories and how to avoid them

By Andy Syrewicze, Microsoft MVP and Technical Evangelist, Hornetsecurity 2023 has seen a host of malicious cyber-attacks targeting a range of organisations from police forces to healthcare providers. The threat landscape has transformed drastically across the course of my career,…

DP World Cyber Attack puts Australia on High Alert

Over the recent weekend, DP World Australia, a prominent maritime freight operator, fell victim to a sophisticated digital attack, prompting swift action from authorities. In response to the breach, access to the corporate network was temporarily halted, and operations at…

Cyber Attack news headlines trending on Google

The Washington State Transportation website and its mobile app experienced a disruption due to a sophisticated cyber attack earlier this week. According to information shared on the X, WSDOT ferry vessel watch social media platform, both online freight services and…

What is a diamond model of Intrusion Analysis

The Diamond Model of Intrusion Analysis is a framework used in cybersecurity to analyze and understand cyber threats and intrusion events. It provides a structured way to break down and analyze cyber incidents, helping security professionals and incident responders to…

Why you need ZTNA with Desktops-as-a-Service

By Karen Gondoly, CEO of Leostream As the world increasingly works remotely, Desktops as a Service (DaaS) are becoming ubiquitous in many industries. Remote workers need access to cloud and on-premise data and applications, and delivering that access in a…

Is Microsoft ChatGPT grappling with DDoS Cyber Attack

In recent days, Microsoft’s generative AI tool, ChatGPT, has been experiencing connectivity problems. The official message on the website indicates that their servers are operating at full capacity. However, an article published by Bloomberg suggests that the technology giant’s AI…

Can a Brute Force Attack Be Reversed?

Brute force attacks are a common and often successful method employed by hackers to gain unauthorized access to various systems, accounts, or data by systematically trying all possible combinations of passwords or encryption keys. While it may seem like the…

Cerber Ransomware hackers target Atlassian Confleunce servers

A recent study conducted by the cybersecurity firm Rapid7 has revealed that multiple ransomware groups are actively targeting vulnerabilities in Atlassian Confluence Servers. One such criminal group, responsible for the distribution of Cerber Ransomware, is exploiting these vulnerabilities in Confluence…

Palo Alto Networks acquired Talon Cyber Security

Israel-based browser-based startup Talon Cyber Security has recently been acquired by the networking giant Palo Alto Networks. Palo Alto Networks has been actively integrating new technology into its existing products. Remarkably, this acquisition was not hindered by the ongoing conflict…

Cyber Attack news headlines trending on Google

1. Shimano, a cycle component manufacturing company, fell victim to a ransomware attack in which hackers managed to steal approximately 4.5 terabytes of sensitive business-related information. The incident is believed to be the work of the LockBit Ransomware gang and…

QR Codes are a Security Blindspot

By Mary Blackowiak, Director of Product Management and Development, AT&T Business Whether at the grocery store, eating dinner at a restaurant, locating a gate at the airport, gaining entry to an event, or even watching TV—QR codes are popping up…

Ransomware hits Infosys, Ace Hardware and Henry Schein

1.) A recent cyber attack targeted Infosys subsidiary, Infosys McCamish Systems, which was initially detected last week but only officially acknowledged this Tuesday. According to sources within our Cybersecurity Insiders, this incident appears to involve a ransomware variant, with further…

What is data security posture management

Data Security Posture Management (DSPM) is a comprehensive approach and set of tools and practices that organizations use to assess, manage, and improve their data security posture. It involves monitoring, evaluating, and enhancing data security measures to ensure the confidentiality,…

10 ways to know your smart phone has spying malware

Numerous world leaders have expressed concerns regarding espionage-related malware being surreptitiously planted on their personal devices by their adversaries. This clandestine practice aims to gather classified information or monitor their activities. Apple Inc. issued a statement yesterday, urging iPhone users…

Trending Cybersecurity News headlines on Google

Apple dismisses political controversy over its security alert Apple Inc has released a statement acknowledging attempts by state-sponsored actors to breach the devices of its users in various countries, including India. However, the company distanced itself from the ongoing espionage…

Top Cloud Misconfigurations Leading to Cloud Data Breaches

As organizations increasingly migrate their operations to the cloud, the security of their cloud infrastructure becomes a paramount concern. While cloud services offer numerous benefits, mis-configurations in cloud environments can inadvertently expose sensitive data and lead to catastrophic breaches. In…

Generative AI and Cybersecurity in a State of Fear, Uncertainty and Doubt

by Jason Rebholz, Chief Information Security Officer, Corvus Insurance Organizations are finding innumerable ways to incorporate generative artificial intelligence (GenAI) and large language model (LLM) technologies to speed up processes, gain efficiencies, eliminate repetitive, low-value tasks and enhance knowledge, among other uses.…

Generative AI: The Unseen Insider Threat

by Steve Povolny, Director, Security Research at Exabeam Artificial intelligence, or AI, as it’s commonly known, is all the rage these days. The widespread availability of free generative AI tools like ChatGPT has allowed the technology to be embraced by…

Navigating Security, Business Continuity, Through a Downturn

Steve Durbin, Chief Executive, Information Security Forum With inflationary pressures mounting and downturn fears hovering, it’s natural for organizations to scale back on their overall spending, including cybersecurity. After consecutive years of double-digit growth, cybersecurity spending appears to be slowing down mainly because CISOs…

The Evolution of Financial Fraud

By Greg Woolf, CEO of FiVerity The marriage of fraud and artificial intelligence (AI) is lethal. Right now, fraudsters are upping their games, leveraging new and innovative tools such as ChatGPT and Generative AI to wreak havoc on the financial…

India witnesses biggest data breach of Aadhaar details via ICMR

Aadhaar, the unique identification number issued to every Indian citizen, has recently made headlines for all the wrong reasons. There are alarming reports suggesting that the personal information of approximately 815 million citizens was illicitly accessed by hackers through the…

Ransomware news trending on Google

1.) A ransomware group known as “Play” has recently issued a concerning statement. They have threatened to release the personal details of more than 8,600 Dallas County employees on the dark web unless their ransom demands are met. To add…

Google App turns into malware for many on Smart Phones

The Google app and its synchronized applications, including Maps and Gmail, offer a world of possibilities to users. However, a peculiar situation has arisen, with certain smartphones identifying the Google app as potential malware and warning users against its usage.…

Privacy in the Age of AI: Strategies for Protecting Your Data

Artificial intelligence is no longer just the stuff of science fiction; generative AI tools are seeing massive adoption rates. Unsurprisingly, the marketing and advertising industry has embraced AI-driven tools with the most enthusiasm. According to the latest data from January…

Email Security in the Remote Work Era

“Is your email safe? Think again.” Every day, we send and receive over 333 billion emails worldwide, with the average employee managing 120 of them daily. But, did you know that 94% of cyberattacks start with a malicious email? In…

Ransomware news headlines trending on Google

BHI Energy recently issued a statement revealing that its servers fell victim to a ransomware attack orchestrated by a group known as Akira in June of this year. The breach was not detected until July. The attackers gained unauthorized access…

How to craft a password meticulously

In today’s digital landscape, many online service providers offer the convenience of using a single password across multiple services. A prime example of this is Google, which allows users to access various platforms like Gmail, Drive, Google Photos, Maps, Sheets,…

Microsoft invests $5 billion to bolster Cyber Shield of Australia

Australian Prime Minister Anthony Albanese has unveiled Microsoft’s Cyber Shield, a substantial commitment to bolster the nation’s cybersecurity infrastructure with a $5 billion investment. The announcement was made during the Prime Minister’s visit to the Australian embassy in Washington, D.C.,…

Amazon Web Services launches European Sovereign Cloud

Amazon Web Services (AWS), the American technology giant, has launched an exclusive European Sovereign Cloud to meet the needs of its European customer base. This new cloud infrastructure will operate independently and is designed to address the evolving concerns regarding…

American healthcare looses $78 billion to ransomware attacks

A recent report by Comparitech reveals that the healthcare sector in the United States has incurred staggering losses of $78 billion due to ransomware attacks. These losses are primarily attributed to the significant downtime experienced by healthcare companies over the…

Why EDRs and other preventative measures cannot stop ransomware

As ransomware attacks continue to increase in frequency and sophistication, organizations are searching for ways to prevent them from occurring. One common approach is to implement Endpoint Detection and Response (EDR) solutions and other preventative measures. While these tools can…

Vietnam hackers start stealing Facebook Credentials

Facebook, the world’s leading social networking platform, has recently made headlines for all the wrong reasons. The company led by Mark Zuckerberg has found itself in the news due to a troubling trend: it has become a target for cyber…

Insider Threats nurtured for circumnavigating data centers

A few days ago, our Cybersecurity Insiders reported an alarming trend: hackers are actively persuading employees of corporate firms to surrender their login credentials, providing a gateway for unauthorized network access. Now, sources on Telegram are forecasting an escalation in…

Top 3 Google trending news headlines related to Cyber Attacks

International Criminal Court suffers espionage related cyber attack The International Criminal Court (ICC) has officially determined that the recent cyberattack on its digital systems, which occurred last month, was an act of espionage with the intent to compromise sensitive court…

How Maritime companies can shield from Ransomware

In today’s digital age, ransomware attacks have become a grave concern for industries across the world. Maritime companies, with their extensive reliance on digital systems and global operations, are no exception. Protecting against ransomware is of utmost importance in safeguarding…

Best practices to protect data in remote work environments

By Allen Drennan, Co-Founder & Principal, Cordoniq Addressing the security challenges associated with remote work is critical for today’s Chief Information Security Officers (CISOs). Along with data breaches and ransomware attacks, another top concern is whether company or customer data…

The Evolution of Security: From Signatures to Deep Learning

In cybersecurity, the arms race between defenders and attackers never ends. New technologies and strategies are constantly being developed, and the struggle between security measures and hacking techniques persists. In this never ending battle, Carl Froggett, the CIO of cybersecurity…

Getting your organisation post-quantum ready

While quantum computing is still very much in its early stages, it’s important that companies are already thinking about this evolving technology – and more importantly implementing and stress testing much needed solutions suitable for a post-quantum world. In this…

Netflix password sharing crackdown yields excellent results

For all those who were accustomed to sharing their Netflix passwords with friends and family, here’s an important update on how the company has taken action against this practice. Netflix released an official statement last Wednesday, indicating that its efforts…

Trending cyber attack related news headlines on Google

IBM confirms Johnson & Johnson Data Breach with 631k affected IBM has officially confirmed a data breach involving Johnson & Johnson, impacting approximately 631,000 individuals. This breach occurred on the servers of Johnson and Johnson’s patient medication platform. While the…