Tag: Cybersecurity Insiders

Safeguarding Data for the Quantum Era

In today’s ever-evolving cybersecurity landscape, staying ahead of potential threats is a constant challenge. Advanced persistent threats, ransomware, and wipers are just a few risks organizations must guard against. However, quantum computing is one of the most complex and far-reaching…

Quantum-Proofing Enterprise Security: The Clock is Ticking

Many experts believe that quantum computing will arrive in the next decade. The unparalleled processing capabilities of these computers hold promise for advances in material science, drug discovery, artificial intelligence, environmental science, and much more. While quantum computing opens up…

Malaysia PM says NO to $10m demand of ransomware gang

A ransomware group, whose identity remains undisclosed, has reportedly targeted a significant portion of the servers at Kuala Lumpur International Airport. Despite multiple demands from the attackers for a ransom of $10 million, Malaysian Prime Minister Anwar Ibrahim has firmly…

Motivations for Hackers to launch Cyber Attacks

These days, in this interconnected world, cyber attacks have become a significant threat to businesses, governments, and individuals alike. The motivations behind these attacks are varied, ranging from financial gain to political agendas, and the methods used by hackers are…

Cyber Attack news headlines trending on Google

Interpol Carries Out Major Arrests in Global Cybercrime Crackdown In a significant operation called “Operation Red Card,” Interpol has apprehended more than 300 individuals linked to cyber-attacks targeting both public and private organizations across Africa. Those arrested are believed to…

AI as an ally: The future of scam protection

A look at how the industry can turn AI into a powerful scam-fighting tool  Artificial intelligence (AI) has advanced exponentially in recent years, but the truth is that AI technology is a double-edged sword. While AI helps with countless innocent…

Kyocera CISO: Five reasons to consolidate your tech vendors

Andrew Smith, Kyocera’s CISO, explains why organisations should consider consolidating their tech vendors and how to avoid vendor lock-in Managing a full suite of tech vendors can be time-consuming and complicated. AI, cybersecurity, document management – the list can feel…

Expert Insights on NVIDIA GTC 2025 Highlights

The 2025 NVIDIA GPU Technology Conference (GTC) showcased groundbreaking advancements and innovations in the field of AI and quantum computing. Among the highlights were the introduction of the Blackwell Ultra AI chips, the unveiling of the Groot N1 AI model…

Learn Malware Analysis with This Hands-on Course

While cyber threats evolve at an unprecedented pace, equipping the next generation of cybersecurity professionals with practical, hands-on skills is more critical than ever. ANY.RUN’s Security Training Lab offers a learning environment where users can analyze real-world malware, understand attack…

Examining the State of IGA

Today’s organizations face a rapidly multiplying number of digital identities as hybrid work and cloud, SaaS, IIoT, and other technologies proliferate. Companies understand the critical nature of identity security, but they still find Identity Governance and Administration (IGA) challenging and…

Akira Ransomware encryption breached with cloud computing

Ransomware attacks have become one of the most feared cyber threats in recent times. Cybercriminals are increasingly leveraging sophisticated technologies, including artificial intelligence (AI), to execute highly effective and near-flawless attacks. The growing sophistication of these attacks makes them difficult…

Europol warns against Hybrid Cyber Threats

Europol has raised an urgent and serious alarm about the growing menace of hybrid cyber threats, particularly those orchestrated by Russia and other state and non-state actors. These attacks, Europol warns, are part of a larger strategy aimed at destabilizing…

Browser search can land you into ransomware troubles

For years, ransomware attacks have targeted individuals, corporate networks, and government agencies. However, experts are now highlighting a new method of ransomware distribution — one that leverages browser searches to spread malicious software. In this latest scheme, victims unknowingly fall…

Google buys Wiz for $32 billion

Wiz, a leading provider of cloud security software, is set to become part of Google by May 2026. Alphabet Inc., Google’s parent company, has announced plans to acquire the Israeli-based cloud protection software provider for $32 billion in an all-cash…

Cyber Attack halts a murder shooting trial in American court

To date, we have seen numerous cyberattacks targeting critical infrastructure such as hospitals, power grids, water utilities, and even nuclear plants. However, it’s less common to think about how a digital assault could directly impact the judicial system. Imagine this…

Social Media and Email hacking surged in 2024

In 2024, a significant surge in hacking activities targeting social media and email accounts was reported, according to Action Fraud. The increase in cyber-crime complaints compared to the previous year, 2023, was staggering, with reports soaring from 23,000 cases in…

Technical Tips to Evade AI-Based Cyber Threats

As artificial intelligence (AI) continues to evolve, so do the tactics employed by cybercriminals. AI-based cyber threats have become increasingly sophisticated, utilizing advanced algorithms to carry out targeted attacks, bypass traditional security measures, and exploit vulnerabilities in systems. To stay…

Cyber Attack News: Top Headlines Trending on Google

Malware Impersonating Booking.com Targets Hospitality Sector Microsoft Threat Intelligence researchers have been tracking a cybercriminal group targeting the hospitality industry. Known as Storm-1865, this group is spreading credential-stealing malware, with activities dating back to late 2024. The attackers have created…

FBI alerts Gmail users over Medusa Ransomware

The FBI, America’s federal law enforcement agency, has issued an urgent warning to all Gmail users about an ongoing hacking campaign carried out by the operators of Medusa Ransomware. According to the FBI, this cybercriminal group is notorious for encrypting…

Blockchain and cyber security

The global blockchain security market is projected to grow from an estimated US$20bn in 2024 to $250bn in the next five years as companies leverage the technology to enhance a variety of different processes, but this growth will also reshape…

Cybersecurity in the Age of Scarcity

Ditching ‘More People, More Controls’ for a Smarter Approach With all the layoffs happening in the federal government, the world of cybersecurity has not gone unscathed. At last count, more than 130 positions were cut from the Department of Homeland…

Most Secure AI Models for Enterprises

For business leaders around the globe, AI promises an exciting edge in innovation and efficiency. The rapid evolution of AI models – and the agentic AI applications they facilitate – look like a game-changer for companies in all categories. AI…

M2M Security Market: Endless Opportunities to Ensure a Secured Future

Machine-to-machine (M2M) communication is a cornerstone of model digital infrastructure that helps machines connect without human intervention. M2M is the word used to describe the automatic, human-free flow of information between machines using direct communication.   Key advancements in security will…

How Generative AI Can Strengthen Corporate Cybersecurity

As cyber threats continue to evolve, organizations are increasingly turning to innovative technologies to bolster their cybersecurity defenses. One of the most promising advancements in this field is Generative Artificial Intelligence (Gen AI), which has shown tremendous potential in enhancing…

Data Breach stories of Bank of America and Jaguar Land Rover

Jaguar Land Rover Data Breach Exposes Sensitive Information Jaguar Land Rover (JLR), one of the world’s premier luxury car manufacturers, is facing a data breach after a hacker, identified as “Rey,” posted sensitive documents related to both employees and customers…

Can Data Security Affect SEO Efforts Put Forward by a Company?

In today’s digital world, companies are increasingly investing in search engine optimization (SEO) as a critical strategy for driving traffic and visibility. SEO, in its essence, helps businesses improve their search engine rankings, enhance their online presence, and attract relevant…

Twitter not down due to Cyber Attack

On March 10, 2025, Twitter users across the globe experienced widespread disruptions in service while attempting to access their accounts. The outage impacted users worldwide, but a significant portion of the disruptions were concentrated in the western regions, particularly the…

What Risk Managers Need to Know About SIG 2025

During geopolitical tensions, supply-chain uncertainties, and fast-moving regulatory changes, organizations accelerate their risk-management programs, especially when mitigating risks inherent in business relationships with other organizations. With so many challenges and headwinds to face, risk managers are increasingly pressed to use…

How AI Agents Keep Defenders Ahead of Attackers

Most organizations today struggle with the basic of things. They don’t know how many endpoints they have on their network. They don’t know if they have antivirus installed. If they get a simple alert they don’t know its cause or…

The Governance Model Required for Success in the Era of AI

A recent survey revealed that nearly three-quarters of business leaders plan to implement generative AI within the next 12 months. However, almost 80 percent were not confident in their ability to regulate access and governance of these AI applications, citing…

Future-Proofing Digital Payments: Five Strategies for AI-Driven Security

AI is rapidly transforming digital payments, revolutionizing money movement, and enhancing fraud detection. However, cybercriminals are using the same technology to launch deepfake scams, synthetic identities, and adaptive fraud techniques that evade traditional defenses. To outpace these evolving threats, financial…

AI Cyber Attacks to intensify on organizations

AI-driven cyberattacks targeted more than 87% of organizations in 2024, according to a study conducted by SoSafe, a German cybersecurity platform that helps enhance employee awareness of cybersecurity threats. The SoSafe 2025 Cybercrime Trends report highlights that 91% of security…

Avoiding the Single Point of Failure

In July of 2024, cybersecurity software company CrowdStrike pushed an update to millions of computers around the world. The update, which should have been perfunctory, caused widespread chaos as computers at airlines, hospitals, and other critical industries began to crash,…

North Korea exploits GitHub with fake profiles and Insider Threats

North Korea has long been recognized for its sophisticated cyber operations, particularly targeting financial institutions and cryptocurrency databases to fund its nuclear and ballistic missile programs. In addition to these high-profile cyberattacks, North Korean hackers have increasingly adopted more subtle…

Can Tokenization Help Secure Payment Data for Financial Institutions

Tokenization is increasingly being recognized as a powerful security measure for protecting sensitive payment data within financial institutions. By replacing sensitive information, such as credit card numbers or bank account details, with randomly generated “tokens,” tokenization reduces the risk of…