Category: Cybersecurity Insiders

The 2025 cyber security threat landscape

The cybersecurity landscape in 2025 is sure to undergo transformative shifts driven by technological advancements and evolving global threats. The integration of AI into cybercriminal operations, the growing reliance on tokenized payment systems, and the increasing intersection of geopolitics with…

TP Link routers to be banned for data security concerns

During the previous administration under President Donald Trump, Chinese telecom and networking equipment suppliers, including ZTE and Huawei, faced significant trade restrictions in the United States. These bans are still in effect under President Joe Biden’s administration, with no signs…

A Path to Enhanced Security and NIS2 Compliance

The digital landscape has evolved significantly over the last decade, with organizations facing increasingly complex and sophisticated cyber threats. Traditional cybersecurity models, based on perimeter defenses and implicit trust within the network, are no longer sufficient.  Enter Zero Trust, a…

The Birth of Zero Trust: A Paradigm Shift in Security

In the realm of cybersecurity, the concept of “Zero Trust” has emerged as a revolutionary approach to safeguarding our digital assets. This paradigm shift, which challenges traditional security models, has its roots in the evolving landscape of technology and the…

Cloud Security Report 2024

Introduction Companies are increasingly pursuing a cloud-first strategy by developing and deploying applications with the cloud in mind. With the majority of organizations adopting a hybrid or multi-cloud approach to support various use cases and work models, the attack surface…

How to Prevent Cyber Threats in the Chemical Sector

The chemical sector plays a crucial role in the global economy, providing essential materials for industries ranging from pharmaceuticals to agriculture. However, as technology advances, so do the risks associated with digital systems. Cyber threats, such as ransomware, data breach-es,…

Ransomware attacks on Texas University and Namibia Telecom

Interlock Ransomware Targets Texas Tech University Health Sciences Center A relatively unknown ransomware group, Interlock, has reportedly targeted the Texas Tech University Health Sciences Center, posing a significant threat to the personal data of over 1.46 million patients. The gang…

How Man-in-the-Middle Attacks Can Be Thwarted

Man-in-the-middle (MITM) attacks are a significant cybersecurity threat, where an attacker intercepts and potentially alters communication between two parties without their knowledge. These attacks are particularly concerning in online environments, where sensitive data like login credentials, credit card information, and…

Cybersecurity News Headlines Trending on Google

Surge in Passkey Security Adoption in 2024 Tech giants such as Google, Amazon, Microsoft, and Facebook are leading the charge in moving away from traditional passwords, embracing passkey security technology. As of 2024, passkey adoption has seen a significant increase.…

Addressing the Disconnect in External Attack Surface Awareness

External vulnerability scans have become a staple in the cybersecurity toolkit of most organizations. Similar to a penetration test, external scans are designed to discover open ports and internet exposed assets including websites, servers, APIs, and other network endpoints to…

Legacy VPNs: A Ticking Time Bomb for Modern Organizations

In an era defined by the exponential growth of digital transformation, traditional Virtual Private Network (VPN) solutions have become a significant liability for modern organizations.  While VPNs were once heralded as a secure method of enabling remote connectivity, they are…

The three top cybersecurity predictions for 2025

The cyberthreat landscape has shifted rapidly over the past several years, and this evolution will continue in 2025. AI has become more powerful and accessible; as a result cybercriminals are using the technology to launch sophisticated phishing attacks, conduct surveillance…

How AI will both threaten and protect data in 2025

As we move into 2025, generative AI and other emerging technologies are reshaping how businesses operate, while at the same time giving them different ways of protecting themselves. All these changes mean that a company’s risk of an adverse cyber…

Apple iOS devices are more vulnerable to phishing than Android

For years, there’s been a widely held belief that iOS devices—such as iPhones—are virtually immune to phishing attacks, largely due to Apple’s strong emphasis on security and its reputation for prioritizing user protection. In contrast, Android devices, with their more…

Rising Cyber Extortion Threats Targeting Large Companies in 2024

Moody’s, the global financial services and credit ratings company, has recently released a report highlighting a disturbing trend: hacking groups are increasingly targeting large organizations for significant payouts, often exploiting vulnerabilities in the supply chain to maximize their profits. The…

Pros and Cons of Differentiating Cloud Security Tools

As organizations increasingly migrate their operations to the cloud, securing sensitive data and ensuring privacy have become top priorities. Cloud security tools play a pivotal role in helping organizations safeguard their digital assets from cyber threats. However, businesses must decide…

Ransomware related news trending on Google

Akira Targets Cipla Pharma with Major Data Theft: 70GB of Sensitive Information Stolen Cipla, one of India’s leading pharmaceutical giants, has fallen victim to a devastating ransomware attack by a group known as Akira. The cyberattack resulted in the theft…

Security Service Edge Adoption Report 2024

Introduction Hybrid work is the new reality for many businesses, but it also poses new challenges for cybersecurity. CISOs and security architects need to rethink how they protect their critical resources from cyber threats, as they have to deal with…

Cybersecurity Leader SonicWall Shares 2025 Outlook

Cybersecurity leader SonicWall has just released their 2025 outlook, including the threats, challenges and trends that will shape the sector in the year ahead. Below, SonicWall’s leading team of threat researchers share their forecast including the key vulnerabilities and threats…

Ransomware attacks cost $17 billion in downtime

Ransomware attacks have been a growing threat to businesses and individuals over the past several years, causing significant financial losses and operational disruptions. The effects of these attacks extend far beyond the immediate ransom demands. Companies and individuals are faced…

Ransomware attack on Deloitte and British Telecom

Deloitte UK Targeted by Brian Cipher Ransomware Attack Deloitte UK, one of the world’s leading professional services firms, has fallen victim to a significant cyberattack involving the Brian Cipher ransomware. The attack has reportedly compromised an estimated 1TB of sensitive…

Apple espionage on its employees iPhones and iCloud accounts

In recent years, we have witnessed a growing trend of surveillance by various entities—ranging from individuals to state actors and organized groups—monitoring both public and private organizations. This trend has also extended to governments using technology like facial recognition to…

UK Ministry of Defense MoD passwords leaked on Dark Web

The United Kingdom’s Ministry of Defense (MoD) has recently made headlines after it was revealed that over 560 staff members’ passwords were exposed on the dark web, triggering widespread concern within Parliament. The breach is believed to be the work…

How Data Backups Turn Vital in Ransomware Scenarios

Ransomware attacks have become one of the most menacing threats to businesses, governments, and individuals alike. These malicious software programs encrypt vital data and demand a ransom, often in cryptocurrency, to restore access. With the growing sophistication and frequency of…

Shopping Season sparks new Cyber Threats

As Christmas 2024 rapidly approaches, the excitement of holiday shopping is in full swing. While many people have already scored deals during Black Friday and Cyber Monday, these sales are quickly wrapping up, leaving only a brief window to capitalize…

Can AI help in curbing efficiency of cyber attacks

Yes, AI can play a significant role in improving the efficiency of detecting and preventing cyberattacks, potentially curbing their impact. Here are several ways in which AI helps in cybersecurity: 1. Threat Detection and Prevention AI can be used to…

The Top Automated Identity Threat Protection Solutions

In today’s interconnected world, digital identities are the keys to accessing sensitive information, financial assets, and critical systems. However, as technology advances, so do the methods used by cybercriminals to exploit these identities. From phishing and credential stuffing to account…

Future proofing business with resilient network solutions

Today’s world is powered by technology. Most day-to-day business operations are underpinned by online systems and digitally stored data. And, with over 60% of the UK’s workers on a hybrid working schedule, reliable access to these applications from anywhere, anytime…

Election Integrity in the Age of Artificial Intelligence

With the rapid rise and increased access to artificial intelligence, fraud concerns were predicted to disrupt the 2024 election as misinformation circulated throughout. In addition to influencing voters’ perceptions, AI has been used to suppress voter turnout and provide false…

Mastercard to say goodbye to passwords

Mastercard is on track to phase out passwords by 2028 and will also eliminate the use of card numbers and one-time codes by 2030. Instead, the company plans to shift toward more secure methods, such as tokenization and biometric authentication,…

Zscaler’s Top 10 Predictions for 2025

In 2025, organisations looking to succeed will have no choice but to become more proactive, resilient, and innovative to stay ahead of the evolving threat landscape. While they may have long grappled with the complexities of regulatory compliance, a new…

COOs Will Make Impact-Based Security a Mainstream Requirement

Cyber risk management accounts for the probability of attacks on operational technology (OT) at large industrial facilities, including all the components that control equipment, automation, safety, network communications, their infrastructure, and more. However, a gap often exists between the CISO…

HawkEye Malware: Technical Analysis

HawkEye, also known as PredatorPain (Predator Pain), is a malware categorized as a keylogger, but over the years, it has adopted new functionalities that align it with the capabilities of other tools like stealers. History of HawkEye HawkEye emerged before…

Ransomware spreading through Microsoft Teams

Black Basta ransomware, a notorious cybercrime group, has recently resurfaced in the news for its new and alarming method of spreading file-encrypting malware through Microsoft Teams. Teams, a widely used messaging and collaboration app, has become a target for this…

Protecting Against Inevitable Insider Threats

The seven pillars of the Department of Defense (DOD) Zero Trust Reference Architecture provide a comprehensive framework for securing today’s organizations. However, the data layer – arguably the most critical and foundational pillar – remains insufficiently addressed. This gap is…

How to Safeguard Mobile Banking Apps from Cyber Risk

The convenience of mobile banking has transformed financial services, making banking apps more accessible and user-friendly. According to the Statista Research Department, more than 66% of the population in 2023 used online banking services, and this trend is expected to…

Starbucks targeted by a ransomware attack

A recent ransomware attack targeting Blue Yonder, a company providing supply chain software, has caused notable disruptions in the IT systems of its client, Starbucks, a major player in the food and beverage industry. The attack primarily affected employee information,…

How Android and iOS Devices Are Affected by Stalkerware

Stalkerware, a type of malicious software that allows someone to secretly monitor and track another person’s device, has become a growing concern for mobile users. While this software is commonly used by malicious individuals to invade privacy, it can also…

2024 VPN Risk Report

Introduction In the past, Virtual Private Networks (VPNs) have been the go-to solution for remote access. However, with the surge in remote work and distributed workforce models and the rise of cloud adoption, the basic connectivity provided by VPNs is…

British businesses lost $55 billion from Cyber Attacks

For years, we’ve heard countless reports of individuals and businesses lamenting the significant losses they’ve suffered due to cyber-attacks. But a recent report from Howden reveals a staggering figure: UK businesses have lost a total of $55 billion (£47 billion)…

Microsoft seizes websites distributing Phishing email kits

Microsoft has recently issued a significant warning regarding the activities of a cyber-crime group named ONNX Marketing Services, which has been identified as distributing highly sophisticated phishing email kits. These kits have the potential to compromise Microsoft Customer Accounts across…

The Silent Revolution in Cybersecurity: Going Passwordless

The digital landscape is evolving rapidly, with it, the threats we face online. As cyberattacks grow in sophistication, so must the defenses that protect our sensitive information. Among the groundbreaking shifts in cybersecurity, one revolution is unfolding silently yet powerfully:…

How to test if your smart phone is spying on you

In today’s digital landscape, data privacy and security are top concerns for users, especially those relying on smartphones, as these devices may inadvertently record conversations and transmit data to remote servers. If you’re worried about potential eavesdropping by your smartphone,…