Category: Cybersecurity Insiders

DDoS attack hits Mastodon, the Twitter rival

As soon as Tesla Chief Elon Musk took over the reins of Twitter in the October 2022, many users who weren’t happy with his takeover jumped to Mastodon, a Germany-based social media platform. The aversion was such that the user…

Ransomware Attack news headlines trending on Google

According to a press release of Hospital Clinic de Barcelona, the computer systems at a ransomware attack disrupted the said hospital, this cancelling nearly 90 emergency operations and disallowing 3000 patients going for a general checkup. The attackers conducted the…

What is firewall optimization?

Firewall optimization (also known as firewall analysis) is the process of analyzing and adjusting the configuration and policy set of a firewall to improve performance and security. This process involves reviewing and corelating log data and device configurations, identifying potential…

Cisco to acquire Valtix

Cisco, the networking giant that also into the business of cloud and Cybersecurity business, has announced that it is soon going to acquire Valtix, a start-up in the business of cloud security. Information is out that the deal might take…

Governance of Zero Trust in manufacturing

Read the previous blog on Governance of Zero Trust in manufacturing in the series here. Manufacturers are some of the most ambitious firms on the planet when it comes to harnessing the power of edge technology to modernize their businesses. As they…

LATEST CYBERTHREATS AND ADVISORIES – MARCH 3, 2023

Major U.S. government and corporate breaches, the White House enforces TikTok ban and the NCSC issues zero trust guidance. Here are the latest threats and advisories for the week of March 3, 2023.  Threat Advisories and Alerts  NCSC Publishes Guidance…

Cybersecurity headlines trending on Google

CISA of the United States has issued a warning to all public and private entities to stay away from the Royal Ransomware group. They issued an advisory as a part of StopRansomware Campaign and issued some tips that help raise…

Cybersecurity Industry News Review: February 28, 2023

By Joe Fay  Australia to scrap cybersecurity rules as part of a new regime, ransoms bankroll further ransomware attacks, Dole and PyPi attacked, while the European Commission calls time on TikTok.  Australia to Overhaul Cybersecurity Rules  The Australian government is…

China working on Microsoft OpenAI ChatGPT

Any priced item in the world, mostly electronics, gets duplicated in China and is thereafter sold as a cost-effective product. Meaning, those who cannot afford a branded good can get the Chinese product for half or quarter of the price.…

Integrating Cybersecurity in UX design

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Integrating Cybersecurity in UX design The digital landscape…

Cyber Attack news headlines trending on Google

WH Smith, United Kingdom’s most popular bookseller and stationary seller has become a target of a cyber attack that led to leak of information such as names, addresses, national insurance numbers and DOBs of staff members, both current and former.…

Law firms facing malware cyber threat

From early this year, two malware variants targeted almost 6-7 law firms spread through two separate incidents, alerting whole of the world about the lurking cyber threat. Cybersecurity firm eSentire was the first to uncover the truth as its security…

How to protect your car dealership from cyber-attacks

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Recent trends show that car dealerships are becoming…

The Top 5 New Social Engineering Attacks in 2023

By John E. Dunn Forget vanilla phishing attacks – cybercriminals today have much more interesting tricks up their sleeves. MFA Fatigue Attacks  When push notification via smartphone first appeared, it looked as if the industry had finally found a type…

The Significance of Key Risk Indicators in Organisations

By Vivek Soni, CCSP Key Risk Indicators (KRIs) are critical predictors/indicators of undesirable events that can adversely impact the organisation. These are the kind of metrics which are forward looking and contribute to the early warning sign that facilitates enterprise…

(ISC)² Security Congress 2023 Begins Call for Presentations

Practitioners from across the cybersecurity industry and the (ISC)² member community are invited to submit their session proposals as the cyber world begins its journey to Nashville.  (ISC)² today launched its call for presentations for its annual (ISC)² Security Congress…

Provide Your Feedback on the CISSP-ISSEP Exam Outline

At (ISC)², we pride ourselves in our steadfast dedication to maintaining the relevance and quality of all the certifications in our portfolio. (ISC)² certifications are constantly being reviewed and updated to make sure they are serving the needs of professionals…

Governance of Zero Trust in manufacturing

Read the previous blog on Governance of Zero Trust in manufacturing in the series here. Manufacturers are some of the most ambitious firms on the planet when it comes to harnessing the power of edge technology to modernize their businesses. As they…

The Bridge to Zero Trust

No one likes to think their company might be hit by a cyber attack or breach, but the truth is cybercrime is one of the biggest threats your organization can face. If you suffer a breach, the loss of data…

Succession Wealth Fails to Keep Cyber Attackers at Bay

By Joe Fay Aviva subsidiary assessing impact on data and customers. Wider group unaffected.  Financial services giant Aviva’s recently acquired subsidiary Succession Wealth has been hit by a cyberattack, leaving it trying to assess the impact on a customer base…

The ethics of biometric data use in security

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In a world where you can scan the…

Integrating Cybersecurity in UX design

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Integrating Cybersecurity in UX design The digital landscape…

Data Breach occurs at Stanford University

Stanford University, one of the top ranked Universities of the United States and world, has become a victim to a cyber attack leading to data leak or unauthorized access of sensitive information. The leaked details include first and last names…

Ransomware attack on Dish Network

A suspected cyber attack of ransomware genre has reportedly downed the entire websites, apps, and internal systems of American Television service provider Dish Network for the past two days and information is out that it could take at least a…

Cybersecurity Industry News Review: February 21, 2023

By Joe Fay Think tank warns as economic, political, and cybersecurity risks collide. Accenture heads to Brazil, quantum security firm Sandbox fills up on cash and Biden loses cyber director. Washington Think Tank Warns on Economic Risk and Cybersecurity  Increased…

How to protect your car dealership from cyber-attacks

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Recent trends show that car dealerships are becoming…

Dole suffers a ransomware attack

Dole, the online retailer that sells fresh fruits and vegetables, suffered a ransomware attack, disruption its operations and order full fulling to a large extent. Thus, with the latest, the Irish Mega Corp is the second largest company after JBS…

Latest Cyberthreats and Advisories – February 17, 2023

Romance scams, high-profile attacks on major U.S. companies and an inside look at Royal Mail/Lockbit negotiations. Here are the latest threats and advisories for the week of February 17, 2023. Threat Advisories and Alerts U.S. And South Korean Governments Publish…

Governance of Zero Trust in manufacturing

Manufacturers are some of the most ambitious firms on the planet when it comes to harnessing the power of edge technology to modernize their businesses. As they make plans in 2023 to     enhance business outcomes through the use of technologies such…

CTOs and CIOs to switch jobs by 2025 due to stress

Every professional in cybersecurity dreams of being a CTO or CIO someday. They think the job is having fewer worries and offers a pay-cheque. But in reality, the practical situation is different and isn’t rosy as said. According to an…

Google confirms Russian cyber-attacks on Ukraine

After two days in this month, the war between Ukraine and Russian will enter its second year after completing one full year. And to make things worse, the Putin led nation is also found launching digital attacks simultaneously on the…

Cyber Attack news trending on Google

First is the news related to China. However, this time it’s different and is interesting. To go on with, all these days we have N number of stories about Chinese hackers infiltrating networks across the world. But the current news…

CAP Is Now Certified in Governance, Risk and Compliance (CGRC)

Effective today, the (ISC)² Certified Authorization Professional (CAP) certification is known as the Certified in Governance, Risk and Compliance (CGRC)TM. This name better represents the knowledge, skills and abilities required to earn and maintain this certification. Those who earn and…

Latest Cyberthreats and Advisories – February 17, 2023

Romance scams, high-profile attacks on major U.S. companies and an inside look at Royal Mail/Lockbit negotiations. Here are the latest threats and advisories for the week of February 17, 2023. Threat Advisories and Alerts U.S. And South Korean Governments Publish…

Latest Cyberthreats and Advisories – February 10, 2023

Cyberattacks wreak havoc on the U.K., LockBit brings big business to its knees and a massive VMware ransomware campaign. Here are the latest threats and advisories for the week of February 10, 2023.    Threat Advisories and Alerts  Massive Ransomware Campaign…

The ethics of biometric data use in security

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In a world where you can scan the…

Cyber Attack on Succession Wealth and NHS Staff Data Leaked

Succession Wealth, a financial wealth management service offering company, has released a press statement that a cyber attack targeted its servers and it can only reveal details after the investigation gets concluded. Prima Facie revealed that hackers accessed no client…

How to protect your car dealership from cyber-attacks

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Recent trends show that car dealerships are becoming…

What does 2023 have in store for cybersecurity?

John Fokker, Head of Threat Intelligence, Trellix Amidst sustained geopolitical and economic turmoil, it’s perhaps unsurprising that 2022 was an eventful year for cybersecurity. The emergence of the widespread Log4J vulnerability in January set the tone, with the ongoing cyber…

How to protect backup servers from ransomware

We all know that backup servers are only the sole saviors to an organization when a ransomware incident strikes their IT infrastructure. So, to avoid such troubles from file encrypting malware, the following are the steps to follow to protect…

Cyber Attack news headlines trending on Google

First is the news about the compromise of a SAS network as hackers disrupted Scandinavian airlines computer network and accessed information related to thousands of customers. Karin Nyman, the in-charge spokesperson of SAS, stated that his company was working on…

Calling All CISSP-ISSMP and CISSP Certification Holders

With the ever-changing landscape of the cybersecurity industry, it is important to keep certifications current, accurate and relevant – and we need help from you, the cybersecurity professionals, who hold certifications in the field.   (ISC)² is exploring a new…

Cybersecurity Industry News Review: February 7, 2023

By Joe Fay Derivatives traders, trainer trainers, and finger lickers all hit by ransomware. Russian hackers lash out after Ukraine tanks deal announced. Apple patches decade old devices.   ION Markets Hit by “Cyber Security Event”  Dublin-based data and software firm…