Ransomware, a type of malware designed to encrypt files or systems until a ransom is paid, has rapidly ascended to become one of the most severe cybersecurity threats. This article illuminates the insights shared by Safi Raza, Senior Director of…
Category: Cybersecurity Insiders
Defending Against Ransomware Attacks
Ransomware attacks have emerged as a pervasive and relentless threat, wreaking havoc on organizations of all sizes. The number of ransomware victims announced in March 2023 was nearly double that of April 2022. These malicious acts not only compromise sensitive…
Cybersecurity is not a tool or software piece; is a state of mind: Bridging the gap for career changers
Introduction In recent years, the field of cybersecurity has witnessed a significant influx of professionals from non-Information Technology (IT) backgrounds who are making the leap into this dynamic industry. As a cybersecurity technical developer and instructor, I have had the…
What is an incident response plan (IRP) and how effective is your incident response posture?
As everyone looks about, sirens begin to sound, creating a sense of urgency; they only have a split second to determine what to do next. The announcer repeats himself over the loudspeaker in short bursts… This is not a drill;…
Fujitsu Cloud Security rebuked by Japan and Nickelodeon Data Breach
Japan government has pressed a pause button on all its future deals with Fujitsu Cloud as the latter has failed to curb network misconfigurations that could have led to data leaks. Going by the details, Fujitsu operates a cloud named FENICS…
AI in Cybersecurity – Take the Survey
AI in Cybersecurity – Take the Survey: https://www.research.net/r/AI-Cybersecurity-Survey Artificial Intelligence (AI) and Machine Learning (ML) are revolutionizing the cybersecurity landscape, introducing both transformative capabilities and unprecedented challenges. To better comprehend the adoption trends, challenges, and opportunities presented by AI/ML in…
Minneapolis Public Schools Faces Data Leak Following Ransomware Attack
Minneapolis Public Schools recently fell victim to a ransomware attack, resulting in the unauthorized release of sensitive student information on the internet. The perpetrators, a group specializing in file encrypting ransomware, have taken to dumping files online, exposing details such…
Unmasking the Threat: Understanding Fileless Attacks
As cyber threats continue to evolve, a new breed of attacks has emerged, posing significant challenges to traditional security measures. Among these threats, fileless attacks have gained notoriety for their stealthy nature and ability to bypass traditional antivirus and detection…
Next-Generation Firewalls: A comprehensive guide for network security modernization
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The terms computer security, information security and cybersecurity…
Benefits of Using NFV with SASE
In today’s digital era, businesses actively strive to heighten network agility, boost security, and slash operational costs. Network Function Virtualization (NFV) and Secure Access Service Edge (SASE) stand at the forefront of this revolution, reshaping enterprise networking and security. NFV…
Open Standards & Open-Source Software: What do these solutions mean, and why are they relevant for Digital ID systems?
Highlights taken from Modernising Digital-ID Systems: What Open Standards and Open-Source Software Really Mean, for the Tony Blair Institute for Global Change. As organisations and Governments look to build inclusive Digital ID ecosystems, how do they overcome the key challenge…
Here are 11 of the best technology podcasts you should listen to
Podcasts have undergone a full-blown renaissance in recent years. Whether it’s high-profile celebrities and musicians, online influencers, or catching up on the news agenda from the journalists themselves, more than 400 million people globally now listen to content in this…
ChatGPT, the new rubber duck
Introduction Whether you are new to the world of IT or an experienced developer, you may have heard of the debugging concept of the ‘programmer’s rubber duck’. For the uninitiated, the basic concept is that by speaking to an inanimate…
Blacktail: Unveiling the tactics of a notorious cybercrime group
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In recent months, a cybercrime group known as…
Horse Riding details of 10k users leaked by Ransomware group
An Australian firm that used to organize and host horse riding events in the country has hit the news headlines after hackers released data of 10k users belonging to the firm, after they failed to pay ransom on time. Details…
India Union Cabinet approves Digital Personal Data Protection Bill
India’s Digital Personal Data Protection (DPDP) Bill has received cabinet approval and is set to be presented in the Parliament during the upcoming monsoon session, scheduled between July 20 and August 11. With support from both the ruling Bharatiya Janata…
Top five things to do in Amsterdam
Amsterdam, the capital city of Netherlands, is renowned for its artistic heritage and vibrant culture. An amazing blend of old-world charm and contemporary culture, the city offers a plethora of activities for tourists. From history, to art, or dabbling in…
Turning fridges into SIM cards: An ecological SIM portfolio
This is equivalent to 20,000 tons of polymers – the weight of almost 2 Eiffel towers or 40 Airbus A380s at take-off. Inevitably most of these SIM cards will end up as waste. However, there is another way. In this…
What is the difference between incident response & threat hunting?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. When it comes to protecting data in an…
Stories from the SOC: Fighting back against credential harvesting with ProofPoint
Executive summary Credential harvesting is a technique that hackers use to gain unauthorized access to legitimate credentials using a variety of strategies, tactics, and techniques such as phishing and DNS poisoning. Phishing is the most frequent type of cyber threat…
4 Major Innovations in Healthcare Smart Cards
As the healthcare industry digitises, security is a growing concern for consumers and businesses alike. Our healthcare data is perhaps the most personal information we have, and every effort needs to be made to keep it secure. There is broad…
Banking upstarts: from challengers to pace-setters
Banking upstarts, or ‘Challenger Banks’ have enjoyed remarkable growth over the past 10 years. In fact, research shows that since 2014 Europe-based challengers Atom Bank, Tandem, Monzo, Starling Bank, Revolut and N26 have collectively attracted over $6B in funding and…
Navigating the Cyber Insurance landscape as a Gen Z digital citizen
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the modern world, cybersecurity and cyber insurance…
LockBit ransomware targets Japan Port of Nagoya
The Port of Nagoya in Japan fell victim to a disruptive cyberattack carried out by the Russian ransomware group LockBit on July 4th, 2023, starting at 6:30 AM local time. Reports from the port authorities indicate that more than half…
Ransomware attacks on manufacturing sector proving successful
A recent survey conducted by cybersecurity firm Sophos reveals that ransomware groups targeting manufacturing sector servers have achieved a high success rate in encrypting data and extorting ransoms from their victims. The report titled “The State of Ransomware in Manufacturing…
Understanding Cybersecurity Risk Assessment: A Comprehensive Overview
In today’s interconnected digital landscape, cybersecurity has become a critical concern for individuals and organizations alike. One essential aspect of maintaining a robust cybersecurity posture is conducting thorough risk assessments. In this article, we will delve into the concept of…
How to make your phishing campaign a success
Phishing is the most frequently deployed method used by criminals to initiate a cyber attack, according to research from IBM. Phishing is designed to trick users into clicking on links or downloading attachments that either install malware or give unauthorized…
Cyber Security & Cloud Expo Europe: Agenda Delivers Beyond Expectations
Cyber Security & Cloud Expo is returning to Amsterdam and is set to take place on 26-27 September at RAI. This year’s edition promises to be a groundbreaking experience, with a thought-provoking agenda that delves into the forefront of cybersecurity…
Thales and Google Cloud team up for AI powered data security
Thales, company dealing with technologies surrounding big data and artificial intelligence is all set to team up with Google cloud to offer AI powered data security. Such framework will assist to discover, protect, and classify user data as per its…
Microsoft banishes rumors of cyber attack and steal of data from 30m accounts
Just a day after hacktivists group “Anonymous Sudan” took claim of cyber-attack on Microsoft servers to steal info from over 30 million accounts, the Satya Nadella led company issued a press statement that the publishes stories in a certain section…
What is post-quantum cryptography and why is it important?
Whether you work in the tech field or not, it’s likely that you’ve increasingly heard of quantum computing. As with any emerging technology, along with all the possibilities there are also potential risks. We’ll be unpacking these latest developments, what…
With new aerospace Cybersecurity rules set to land – What’s the standard for operators?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Following a push for greater cybersecurity capability across…
Israel Takes Bold Steps to Expose Cyber Threat Actors, Faces Potential Retaliation
In a groundbreaking move, Israel has become the first country to publicly identify and condemn cyber threat actors, a decision that could potentially escalate tensions with Iran. Moreover, Israel is set to implement a new policy aimed at curbing the…
Navigating the Data Privacy Maze: How DataGrail Advances Privacy Management
Data is rapidly becoming the most valuable commodity, permeating practically every aspect of life. However, with this explosion of data comes the daunting challenge of data privacy. Companies are constantly investing in a multitude of applications, each leading to a…
Dublin Airport staff details leaked in Cyber Attack
A cyber attack on Aon Insurance provider has led to the data breach of about 2000 staff members working for Dublin Airport. Prima Facie revealed that the attack was more intense and is more related to Moveit software that could…
The Future of Artificial Intelligence: Transforming Industries and Shaping Society
Artificial Intelligence (AI) has rapidly evolved in recent years, revolutionizing various industries and transforming the way we live and work. With advancements in machine learning, deep learning, and natural language processing, AI has gained unprecedented capabilities, enabling it to perform…
Incident Management Chronicles: Striking The Right Balance
By Jeff Chan, Vice President of Technology, MOXFIVE If you haven’t experienced a ransomware attack, it’s likely only a matter of time. Adding insult to injury, you will receive no warning. One minute the team is working hard to end…
Winning Budget and Trust as a CISO
Matias Madou, Co-Founder and CTO, Secure Code Warrior Nearly thirty years after the first CISO role was established at Citicorp, the role finds itself in a difficult position. The demands have never been higher—more assets to protect, a larger attack…
How 5G Technology Accelerates Cybersecurity
In the digital age, where connectivity and data exchange play a crucial role, cybersecurity has become a paramount concern. The advent of 5G technology brings not only faster speeds and low latency but also significant advancements in enhancing cybersecurity. This…
NHS data breach after ransomware attack on University of Manchester
A ransomware attack on University of Manchester (UoM) has led to the data breach of over a million patients related to NHS and the data includes NHS numbers of those who took treat-ment, the first three letters of their postal…
Securing Healthcare Data Warehouses: Best Practices for Data Security and Privacy
Securing the healthcare data warehouses themselves is equally vital to ensure the software applications’ security in their development and maintenance. The health data warehouse ecosystem’s integrity and durability depend on software development techniques. Implementing safe coding methods, doing periodic code…
Stories from the SOC: Fighting back against credential harvesting with ProofPoint
Executive summary Credential harvesting is a technique that hackers use to gain unauthorized access to legitimate credentials using a variety of strategies, tactics, and techniques such as phishing and DNS poisoning. Phishing is the most frequent type of cyber threat…
Law enforcement’s battle against Cryptocurrency crime
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. While cryptocurrencies have been celebrated for their potential…
Paracetamol maker Granules India hit by ransomware attack
Granules, the Indian Pharmaceutical company that manufactures Paracetamol has released an official statement that a ransomware attack that targeted its servers last month has resulted in substantial loss of revenue and profitability. As per the details available to our Cybersecurity…
8Base Ransomware targets only companies neglecting privacy of employees and customers
A new ransomware named ‘8Base’ is on the prowl and seems to be only targeting companies that do not show seriousness in protecting information of their customers and employees. The said ransomware gang that is into the tactic of double…
Threat Hunt: KillNet’s DDoS HEAD Flood Attacks – cc.py
Executive Summary Killnet is a hacktivist group based in Russia that has been active since at least 2015. The group is known for launching DDoS attacks on a diverse range of industries, including state and local governments, telecommunications, and defense.…
Venn Redefines Remote Work Security with Innovative BYO-PC Solution
When COVID-19 disrupted our work environments and triggered a massive shift to remote work, organizations faced the daunting task of securing corporate data and apps across thousands of disparate locations and devices. Companies, employees, and IT departments were forced to…
Cybersecurity is not a tool or software piece; is a state of mind: Bridging the gap for career changers
Introduction In recent years, the field of cybersecurity has witnessed a significant influx of professionals from non-Information Technology (IT) backgrounds who are making the leap into this dynamic industry. As a cybersecurity technical developer and instructor, I have had the…
Toward a more resilient SOC: the power of machine learning
A way to manage too much data To protect the business, security teams need to be able to detect and respond to threats fast. The problem is the average organization generates massive amounts of data every day. Information floods into…
Rise of AI in Cybercrime: How ChatGPT is revolutionizing ransomware attacks and what your business can do
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. OpenAI’s flagship product, ChatGPT, has dominated the news…
Wagner Ransomware targets Russian Computers operating on Windows
After the military group named Wagner took over the supremacy realms from Putin for a brief period in the last weekend, a new ransomware is said to be threatening all Windows machines operating in the Russian federation. Wagner ransomware has…
Google AI aggression makes Bernstein research downgrade Alphabet
Google’s AI push in its search engine algorithms has made Bernstein the wealth management company downgrade the technology giant’s parent company Alphabet. Resulting in the value cut of shares by 1.5 percent that will closely mimic in the market performance…
Smartphone Ransomware: Understanding the Threat and Ways to Stay Protected
With the increasing prevalence of smartphones in our daily lives, they have become an integral part of our communication, productivity, and personal data storage. However, as the digital landscape evolves, so do the threats that target our devices. One such…
What is NFV
In today’s fast-paced digital landscape, businesses proactively seek innovative ways to optimize their networks, enhance operational efficiency, and reduce costs. Network Functions Virtualization (NFV) emerges as a transformative technology that leads the charge. NFV revolutionizes traditional, hardware-based network functions by…
Understanding AI risks and how to secure using Zero Trust
I. Introduction AI’s transformative power is reshaping business operations across numerous industries. Through Robotic Process Automation (RPA), AI is liberating human resources from the shackles of repetitive, rule-based tasks and directing their focus towards strategic, complex operations. Furthermore, AI and…
Benefits of Using NFV with SASE
In today’s digital era, businesses actively strive to heighten network agility, boost security, and slash operational costs. Network Function Virtualization (NFV) and Secure Access Service Edge (SASE) stand at the forefront of this revolution, reshaping enterprise networking and security. NFV…
Digital dumpster diving: Exploring the intricacies of recycle bin forensics
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the vast realm of digital investigations, there…
Submarine Cables vulnerable to Cyber Attacks
Most majority of educated individuals are aware that the internet connects people worldwide through underwater cables spanning the depths of the ocean. However, what many fail to realize is that these cables are susceptible to digital attacks that have the…
Mayor candidate slaps Latitude with $1 million lawsuit for data breach
A Mayor candidate of Australia is suing Latitude for not protecting customer details from hackers. As the unsuccessful mayoral candidate was one victim of the data breach, the person is claiming $1 million as damages in the federal court. Shahriar…
Next-Generation Firewalls: A comprehensive guide for network security modernization
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The terms computer security, information security and cybersecurity…
Ransomware attack hits Suncor Energy disrupting fuel station payments across Canada
Numerous gas and fuel filling stations throughout Canada experienced significant disruptions in processing credit card and reward points-based payments due to a cyber attack on Suncor Energy, the parent company. The attack, suspected to be a form of ransomware, affected…
Blacktail: Unveiling the tactics of a notorious cybercrime group
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In recent months, a cybercrime group known as…
Australian Prime Minister urges citizens to turn off their mobile phones to fend cyber attacks
It’s strange! But its true that Australian Prime Minister Anthony Albanese has asked his citizens to turn off their mobile phones daily for 5-10 minutes to combat cyber threats and risks associated to attacks. The suggestion was made after the…
Key Considerations When Hiring a Chief Information Security Officer
In today’s interconnected world, where cyber threats loom large, organizations must prioritize information security. One crucial step towards achieving robust cybersecurity is hiring a competent Chief Information Security Officer (CISO). The CISO plays a pivotal role in safeguarding an organization’s…
Student Sues Whiteworth University for Ransomware Attack
A student of Whitworth University has brought a class action against the university for not keeping student and staff data safe from a ransomware attack that occurred in 2022.. The legal case was slapped against the institute for causing unnecessary…
Apple M1 Chips face LockBit Ransomware threat in development
In recent times, there has been a concerning trend of ransomware groups targeting companies and extracting sensitive information. However, the latest development takes this threat to a whole new level. It appears that a criminal gang has gone a step…
Can we get loan to pay ransom in ransomware attacks
Nope, says a renowned international bank from UK. Instead, the ransom pay can be covered from a cyber insurance policy, provided it is taken prior to the launch of the attack and covers the costs associated with the malware attack.…
Law enforcement’s battle against Cryptocurrency crime
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. While cryptocurrencies have been celebrated for their potential…
Threat Hunt: KillNet’s DDoS HEAD Flood Attacks – cc.py
Executive Summary Killnet is a hacktivist group based in Russia that has been active since at least 2015. The group is known for launching DDoS attacks on a diverse range of industries, including state and local governments, telecommunications, and defense.…
NCSC warns all British Law firms against ransomware attacks
The National Cyber Security Centre (NCSC) of UK has issued a warning to all law firms operating in Britain and European Union to step-up their security capabilities against ongoing ransomware attacks- some funded and propelled by adversaries. Legal data or…
List of victimized companies of MOVEit Cyber Attack
At the end of May 2023, a Zero Day vulnerability was discovered by risk analysing firm Kroll and on June 7th of this year, Clop ransomware gang published on its blog that they have gained access to the servers of…
Using social media as a tool to share knowledge on day-to-day Cybersecurity risks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. When most people think about social media and…
Who’s responsible for securing the open-source software organizations used to build all applications?
Aaron Bray, Co-Founder and CEO of Phylum A few weeks ago, PyPI announced that it temporarily disabled the ability for users to sign up and upload new packages due to “The volume of malicious users and malicious projects being created…
Toward a more resilient SOC: the power of machine learning
A way to manage too much data To protect the business, security teams need to be able to detect and respond to threats fast. The problem is the average organization generates massive amounts of data every day. Information floods into…
How can small businesses ensure Cybersecurity?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Small businesses are more vulnerable to cyber-attacks since…
US DoJ creates a litigation section dedicated to Cybersecurity
Cybersecurity in today’s world is a matter of national security and so the Department of Justice (DoJ) has created a separate litigation section in its National Security Division dedicated to Cybersecurity. Matthew G. Olsen, the head of Justice Department has…
How to earn money using AI based ChatGPT
As an AI language model like ChatGPT, you cannot directly earn money. However, there are a few ways you can potentially utilize ChatGPT to generate income indirectly: Content Generation: You can use ChatGPT to assist you in generating content for…
What is NFV
In today’s fast-paced digital landscape, businesses proactively seek innovative ways to optimize their networks, enhance operational efficiency, and reduce costs. Network Functions Virtualization (NFV) emerges as a transformative technology that leads the charge. NFV revolutionizes traditional, hardware-based network functions by…
Rise of AI in Cybercrime: How ChatGPT is revolutionizing ransomware attacks and what your business can do
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. OpenAI’s flagship product, ChatGPT, has dominated the news…
Biden hosts an AI Forum in San Francisco
As an initial step, the United States leader recently hosted a forum in San Francisco to address issues related to AI development and explore ways in which it can contribute to economic growth while ensuring the well-being and safety of…
Next-Generation Firewalls: A comprehensive guide for network security modernization
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The terms computer security, information security and cybersecurity…
Digital dumpster diving: Exploring the intricacies of recycle bin forensics
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the vast realm of digital investigations, there…
One Overlooked Element of Executive Safety: Data Privacy
By Dimitri Shelest, Founder and CEO of OneRep Companies go to great lengths to protect their top executives. Keeping them safe, healthy and happy so they can perform their duties without unnecessary distractions is critical for the productivity of the…
Cyber Attack on European Investment Bank and Redditt
According to recent reports, it appears that the European Investment Bank (EIB) has fallen victim to a cyber attack orchestrated by the Russian hacking group known as Killnet. These hackers, who have been planning the digital assault since May, aim…
Valence Revolutionizes SaaS Security with AI
The widespread adoption of SaaS applications has created an intricate ‘SaaS mesh’ in most organizations. While these applications have undoubtedly improved productivity, they have also introduced a new set of security risks. From insecure integrations and unmanaged user identities to…
Law enforcement’s battle against Cryptocurrency crime
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. While cryptocurrencies have been celebrated for their potential…
Breached credentials of UK top universities available on dark web
Nowadays, those interested can sieve some of the sensitive to very sensitive information from the dark web and that includes banking and email credentials of individuals and businesses. And according to a report compiled and released by Crossword Cybersecurity, information…
Get a $10m reward for information about Clop Ransomware Gang
The Biden administration in the United States has introduced a rewards program following a cyber attack on multiple government agencies through the use of MoveIT software. The program aims to encourage individuals to provide credible information regarding the activities of…
Enhancing Cybersecurity through Effective Cybersecurity Intelligence
In today’s interconnected world, where technology permeates every aspect of our lives, the importance of cybersecurity cannot be overstated. As cyber threats become increasingly sophisticated and pervasive, organizations and governments alike are recognizing the crucial role of cybersecurity intelligence in…
Zero Trust Framework: A Paradigm Shift in Identity Theft Prevention
In our rapidly digitizing world, the specter of identity theft looms large, casting a shadow over the security of personal and financial information. Identity theft—a criminal act where an individual’s personal details are stolen and misused, predominantly for financial advantage—has…
Threat Hunt: KillNet’s DDoS HEAD Flood Attacks – cc.py
Executive Summary Killnet is a hacktivist group based in Russia that has been active since at least 2015. The group is known for launching DDoS attacks on a diverse range of industries, including state and local governments, telecommunications, and defense.…
Data Loss Prevention in an API-Driven World
By Sudeep Padiyar, Senior Director, Product Management at Traceable AI Preventing data loss has become incredibly challenging in an application programming interface (API)-driven world. Companies lockdown sensitive data internally with access controls, encryption, data classification and data loss prevention (DLP)…
Pure Signal Scout May Finally be the Tool to Help Threat Hunters Move from Reactive to Proactive
In today’s world of ever-increasing cyber threats, the race to stay one step ahead of cybercriminals is more intense than ever. Team Cymru has launched the latest in their suite of threat hunting tools: Pure Signal Scout. The new tool…
Cyber Attack projected on US and European Banking Systems
As European nations such as Germany, France and Britain are offering a helping hand to Ukraine on recommendation by the Biden led nation, 3 notorious hacking groups -Killnet, Anonymous Sudan and REvil have taken a pledge to conduct a digital…
Using social media as a tool to share knowledge on day-to-day Cybersecurity risks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. When most people think about social media and…
Three ways agribusinesses can protect vital assets from cyberattacks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In an era where digital technology increasingly underpins…
Almost all US Fed Agencies fell prey to Cyber Attack
After taking advantage of a security vulnerability on Moveit file transfer software produced by Progress Software, a hacker has reportedly taken control of servers on almost all US Federal Agencies. This was confirmed by Cybersecurity and Infrastructure Security Agency (CISA)…
Understanding the Importance of Cyberthreat Analysis Training Programs
In today’s digital landscape, cybersecurity has become a critical concern for organizations worldwide. With the ever-evolving threat landscape, it is imperative to develop robust defense mechanisms to safeguard sensitive data and infrastructure from cyberattacks. One vital aspect of this defense…
LockBit siphoned $91 million in US alone and so tops the list
LockBit Ransomware was identified as the top extortion gang in the world as it topped the cyber threat list in United States and 6 other countries. According to an advisory published by American CISA the said file encrypting malware spreading…
Crypto trading firm freezes accounts due to a Cyber Attack
Since June 11th, 2023, Floating Point Group (FPG) has been hit by a devastating cyber attack, leading to the suspension of all trading, deposits, and withdrawals. This incident has sparked panic among FPG’s user base, who are eagerly awaiting information…