Category: Cybersecurity Insiders

Medusa Ransomware attack impacts 1.8 million patients

In what could potentially be the largest data breach in the history of pathology labs in the United States, the Medusa Ransomware group has reportedly affected over 1.8 million patients associated with Summit Pathology Laboratory in Colorado. This incident underscores…

Preparing IT teams for the next AI wave

Artificial Intelligence (AI) is fast transforming modern businesses, they are now beginning to understand the importance of risk and compliance – not only as regulatory checkboxes but as critical components of successful AI integration. Historically, these activities have been sidelined,…

IBM Data Breach 2024 might be fake

A cyber threat group known as 888 has made headlines by claiming it has successfully infiltrated the servers of International Business Machines (IBM), allegedly stealing around 17,500 rows of sensitive information belonging to both current and former employees. This assertion,…

Facebook alerts users about the ongoing Malvertising Campaign

Social media platforms can quickly become perilous if users neglect fundamental cyber hygiene practices. This concern is particularly relevant for Facebook users, as an alarming malvertising campaign is currently underway that disseminates SYS01Stealer malware. Presently, Facebook is the epicenter of…

Elections and Financial Crime: Navigating a Shifting Landscape

As global elections reshape the political landscape, the future of financial crime regulation and enforcement hangs in the balance. Explore how changing leadership across major economies can influence financial integrity, compliance, and global sanctions, and learn how businesses can proactively…

Establishing Security Guardrails in the Age of Shadow IT

Staying on top of customer expectations in the digital age means adopting new software at a dizzying pace. Enabling a remote workforce also requires provisioning dozens of SaaS apps and online productivity services. Juggling these business imperatives while keeping data…

How AI Transforms the Employee Experience

Companies expect their investments in AI to unlock worker productivity, improve the customer experience, and boost revenue — but how, exactly, is this going to happen? The devil is in the details, namely, solving for inefficiencies in document workflow. Oft-overlooked,…

US Elections 2024 are super prone to cyber attacks

With only a week remaining until the 2024 U.S. elections, global attention is squarely on America, a nation known for its economic strength. The spotlight isn’t just on the high-profile matchup between former President Donald Trump and current Vice President…

What to Do If Hit by Ransomware

Ransomware attacks are increasingly common, and falling victim to one can be a terrifying experience. If you find yourself in this situation, here’s a step-by-step guide on how to respond effectively. 1. Stay Calm and Assess the Situation   •…

The Hidden Threat of Web Scraping and How to Fight Back

Today’s organizations face a daunting challenge: effectively and at scale detecting and preventing web scraping attacks. These attacks, which involve automated data extraction from websites, can have far-reaching consequences, ranging from increased infrastructure costs to the loss of sensitive information…

Stopping bad things from happening to good businesses

Many businesses, particularly smaller ones, often fail to recognise the importance of cybersecurity. Research indicates that most small and medium-sized enterprises invest less than £500 annually in cybersecurity. This underinvestment is typically due to indifference or a lack of understanding.…

Understanding Cloud Identity Security (CIS)

In today’s digital landscape, where businesses increasingly rely on cloud-based services, ensuring the security of identities within these environments has become paramount. Cloud Identity Security (CIS) is a comprehensive approach to safeguarding user identities, credentials, and access permissions in cloud…

Educated people becoming prime targets to Cyber Frauds

In examining the global landscape of cyber fraud, it becomes evident that a significant proportion of victims are often educated individuals, well-versed in technology and accustomed to digital payment systems, including wire transfers, card payments, and mobile transactions. This trend…

2024 Cloud Security Report Trend Micro

Introduction Cloud security continues to be a critical concern as organizations increasingly leverage multi-cloud environments to drive business growth and innovation. While cloud technologies offer substantial benefits, they also present significant challenges, including complex security management, evolving compliance requirements, and…

Protecting university students with robust network solutions

As students settle into term time at university, cybersecurity is likely not at the forefront of their minds. However, with 97% of higher education organisations reporting a cyberbreach or attack in the past year, universities must prioritise cybersecurity measures to…

Trending Cybersecurity News Headlines on Google

Google’s Ambitious Leap: AI to Replace Web Browsers? In a bold move that could redefine how users access information online, Google, a subsidiary of Alphabet Inc., is introducing an innovative initiative called Project Jarvis. This groundbreaking project aims to embed…

Key Cybersecurity Trends Every CISO Should be well aware off

In today’s rapidly evolving digital landscape, the role of the Chief Information Security Officer (CISO) is more critical than ever. With cyber threats becoming increasingly sophisticated and widespread, staying informed about emerging cybersecurity trends is essential for effectively protecting an…

PRODUCT REVIEW: Fortra’s Digital Brand Protection Solution

THE GROWING CHALLENGE OF BRAND IMPERSONATION Brand impersonation has become one of the most damaging threats facing organizations in the digital age. It involves malicious actors mimicking a brand’s identity across various online channels to deceive customers, employees, or partners.…

A Preemptive Guide to State Cybersecurity Compliance

Cyberattacks are threatening businesses and governments more than ever, and state legislatures nationwide are scrambling to enact stricter cybersecurity laws. To date, 19 states have either signed or passed comprehensive consumer privacy bills. For cybersecurity professionals, this constantly shifting landscape…

Unlocking Business Growth: The Need for Cyber Risk Quantification

Business decisions hinge on well-calculated risk and high-quality, timely data. Leaders must continually interpret this data, anticipate future needs and solutions, and calculate the associated costs. Ensuring the business has the right skills and resources to provide relevant services and…

Ransomware threat to Apple MacOS devices

All these days, ransomware criminals have predominantly targeted Windows and Linux operating systems, leading to significant disruptions across various sectors. However, a recent survey conducted by SentinelOne reveals a concerning shift in this trend, highlighting the emergence of ransomware specifically…

WhatsApp offers new contact management for data security

In recent times, WhatsApp users have typically followed a straightforward process when it comes to managing their contacts: they would save a contact to their mobile device and then access it through the messaging platform whenever necessary. While WhatsApp has…

2024 Report: Insider Threat

Introduction The landscape of insider risk management continues to evolve rapidly, driven by increasing complexities in IT environments, the adoption of hybrid work models, and the rise in adoption of sophisticated GenAI tools by knowledge workers. This 2024 Insider Threat…

Guarding Digital Assets By Understanding Third-Party Access Risks

Companies depend on external partners to support operations and provide various services. Collaborating with contractors, consultants and auditors is often a necessity. However, the reliance on external resources also creates notable security concerns, as allowing partners to access the network…

Ransomware hackers using cloud service platforms as their playgrounds

In recent years, we have witnessed a significant rise in cybercriminal activities, particularly involving ransomware attacks. These gangs have become notorious for infiltrating networks and encrypting sensitive databases, rendering critical data inaccessible unless a ransom is paid. This extortion tactic…

DdoS Attack on Russian Foreign Ministry during BRICS summit

In an increasingly interconnected world, it has become a common phenomenon for hackers to orchestrate sophisticated cyber attacks targeting significant global events. The motives behind these cyber offensives often range from gaining notoriety to making a statement about pressing national…

DdoS Attack on Russian Foreign Ministry during BRICS summit

In an increasingly interconnected world, it has become a common phenomenon for hackers to orchestrate sophisticated cyber attacks targeting significant global events. The motives behind these cyber offensives often range from gaining notoriety to making a statement about pressing national…

Complex controls: Addressing PCI DSS by 2025

PCI DSS 4.0.1 may have been with us for six months now but the reality is that most entities still won’t have made the transition to the new standard in full. This is because the majority of the requirements (51…

Building a Cyber Resilience Framework for Credit Unions

Caught in the digital crosshairs, financial institutions (including credit unions) stand on the front lines of the cybercrime battlefield. These organizations play a vital role in the daily operations of businesses and customers, processing vast amounts of personal and financial…

Can Offline Data Storage Curb Ransomware Attacks?

In an age where cyber threats are an ever-looming concern, ransomware attacks have emerged as one of the most disruptive and financially devastating forms of cybercrime. These malicious attacks encrypt a victim’s data, rendering it inaccessible until a ransom is…

Ransomware group demands $30k for not leaking Transak user data

A lesser-known ransomware group known as Stormous has recently issued a warning that it plans to release sensitive data belonging to approximately 57,000 customers of Transak, a cryptocurrency purchasing platform. The group claims that they have obtained sensitive information about…

Best Programming Languages for Hacking in 2025

As technology evolves, so does the landscape of cybersecurity and ethical hacking. By 2025, certain programming languages will continue to stand out for their utility in hacking and security analysis. Here’s a look at some of the best programming languages…

Sophos to acquire Secureworks

In a significant development within the cybersecurity sector, two major players, Sophos and Secureworks, are poised to enter into a pivotal agreement. Sophos, a leading cybersecurity firm, plans to acquire Secureworks for an impressive transaction value of $859 million. This…

Understanding AI and ML Security in Telecommunication Networks

As telecommunication networks evolve, the integration of Artificial Intelligence (AI) and Machine Learning (ML) has become increasingly vital for enhancing security measures. These technologies provide innovative solutions to combat the sophisticated cyber threats facing modern communication systems, ensuring data integrity,…

AI and cybersecurity – A double-edged sword

The role of AI is being discussed far and wide – from individuals wondering how AI will affect their futures,  and industries embracing it to increase productivity and efficiency, to governments wondering how to mitigate the risks of AI while…

AI to power future data privacy breaches

A new report on the cyber risk outlook by global insurer Allianz Commercial reveals that cyber claims have continued their upwards trend over the past year, driven in large part by a rise in data and privacy breach incidents. The…

AI boost to SWIFT banking network helps thwart Cyber Threats

The banking industry and various sectors within finance are increasingly vulnerable to cyber threats. Cybercriminals are constantly on the lookout for weaknesses in these intricate networks, aiming to disrupt services or steal sensitive data. This stolen information can be highly…

Cyber Awareness Month: The End of the VPN Era

It’s Cybersecurity Awareness Month and what better time to, evaluate the security of your organization’s network access solutions? In fact, I’d say this review is essential. Virtual Private Networks (VPNs) have been the cornerstone of remote access and network security…

Cybersecurity Workforce in Crisis

The world faces a critical shortage of cybersecurity professionals, with a new high of 4.8 million unfilled positions globally. This alarming statistic comes from a first look at the 2024 ISC2 Cybersecurity Workforce Study conducted by (ISC)². The report paints…

DDoS Attacks and the Upcoming US Presidential Election

A few weeks ago, Tesla CEO and X (formerly Twitter) owner Elon Musk hosted a friendly conversation on X with former President Donald Trump. The interview was delayed by more than 40 minutes as X experienced technical difficulties. Musk immediately…

Addressing Critical Gaps in Threat Intelligence Sharing

Almost all organisations agree information sharing and collaboration are crucial elements in the fight against cybercriminals. That’s a majority as high as 91% according to respondents from recent research. With so many in favour of teaming up, it looks like…

Do Passkeys Truly Boost Cybersecurity in the Future?

As the digital landscape evolves, so too do the methods used by cybercriminals to exploit vulnerabilities in online security. Traditional password-based authentication systems are increasingly seen as outdated and insecure, prompting a shift towards passkeys as a potential solution. But…

How to Protect Yourself from Deceitful Identity Theft Trends

Identity theft is a growing concern in our digital age, with scammers constantly evolving their tactics to deceive unsuspecting victims. Protecting yourself from these deceitful identity theft trends requires vigilance and proactive measures. Here’s how you can safeguard your personal…

Ransomware news headlines trending on Google

Sophos Survey Reveals Alarming Trends in Ransomware Attacks Recent findings from a Sophos report titled “Turning the Screws: The Pressure Tactics of Ransomware Gangs” highlight a troubling evolution in ransomware tactics. Cybercriminals are no longer merely stealing data and encrypting…

How to Effectively Handle Mobile Device Cyber Risks

In today’s digital landscape, mobile devices have become integral to both personal and professional life. However, their widespread use also brings significant cyber risks. Here are some effective strategies to mitigate these risks and protect your sensitive information. 1. Implement…

Fidelity data breach happens for the second time in this year

Fidelity, the prominent multinational financial services firm based in the United States, has recently issued a statement alerting its customers to a potential cyber attack that may have affected some of them. The breach involved unauthorized access to Fidelity’s databases…

Nokia claims Cyber Vulnerabilities in the Telecom Sector

According to a recent report by Nokia Threat Intelligence, the global telecom industry, with a particularly alarming focus on North America, is facing significant vulnerabilities to cyber attacks. These threats are increasingly being exacerbated by the use of Generative AI…

One Year Later: The Israeli Tradition of Resilience

One year after Hamas attacked Israel on October 7, geopolitical tensions continue to undoubtedly impact various aspects of life in Israel. Yet, as they have so many times before, the people of Israel continue to show their resilience. In a…

Financial impact of cybercrime

The financial strain on businesses is growing at an alarming rate, largely as a result of escalating cybercrimes. The financial implications of cyberattacks are becoming impossible to ignore. The increasing frequency and sophistication of these threats demand a more strategic…

Cyber Attacks news headlines trending on Google

Cyber Attack on Casio Computer Co. Ltd. Servers Casio, the esteemed Japanese watchmaker, has confirmed that several of its servers were targeted in a cyber attack on October 5, 2024. The breach resulted in the exposure of sensitive information, including…

Cyber Threats Involved in Edge Computing

As organizations increasingly adopt edge computing to enhance performance and reduce latency, they also expose themselves to a unique set of cybersecurity threats. Edge computing involves processing data closer to the source of generation—such as IoT devices or local servers—rather…

Comcast Ransomware attack and American Water Cyber Attack shutdown

Comcast Ransomware Attack 2024: Overview and Implications In a significant cybersecurity breach, telecom giant Comcast has reported that a ransomware attack has compromised the personal information of approximately 230,000 customers. This alarming revelation emerged from a recent filing with the…

Tools for Cyber Threat Hunting: Enhancing Security Posture

In today’s rapidly evolving digital landscape, organizations face an increasing number of cyber threats. Proactive measures, such as cyber threat hunting, have become essential in identifying and mitigating risks before they escalate. Here are some key tools and techniques that…