The landscape of API security is evolving rapidly, driven by increasing complexities in IT environments, the proliferation of third-party APIs, and the rise of generative AI applications. These factors are expanding the attack surface and introducing new vulnerabilities that traditional security…
Tag: Cybersecurity Insiders
Cyber Threat by Google searching Bengal Cats legal in Australia
Cybersecurity experts at Sophos are warning Australian internet users about a growing cyber threat related to a specific search term: “Are Bengal Cats legal in Australia.” Researchers from the UK-based cybersecurity firm have highlighted the risk of SEO poisoning, a…
Three trending Cybersecurity news headlines on Google
Elon Musk’s Starlink Satellite Broadband Caught in the Crossfire of 2024 U.S. Election Controversy Elon Musk’s Starlink, a satellite-based internet communication service, has recently found itself entangled in a growing controversy linked to the 2024 U.S. Presidential Election. The company,…
What is Machine Identity Management?
In the rapidly evolving world of digital transformation, security has become one of the most critical challenges for organizations. While much attention has been focused on securing human identities, a growing concern is the protection and management of machine identities.…
Third-Party Risk Management: The Top 7 Predictions for 2025
With the new year fast approaching, organizations are beginning to plan for 2025 and draft budgets to help these plans come to fruition. Managing risk was central last year in both planning and budgeting – and there is no sign…
Detect and Destroy APTs with Crystal Eye TDIR
Red Piranha is a leading developer & manufacturer of premium Cyber Security products in Australia. Red Piranha is also an official member of Team Defence Australia that promises to deliver advanced cybersecurity capabilities to its clients. By using automation, world-class…
CFPB Rule Changes Presents New Open Banking Challenge – Ensuring Compliance with API Standards
Application programming interfaces (APIs) play a crucial role in modern business, particularly for banks, retailers, and global enterprises, by streamlining financial data transfers. In the financial industry, APIs offer significant advantages, such as reducing IT complexity and simplifying processes for…
Unleashing the Power of Purple Teaming: A Collaborative Approach to Cybersecurity
The traditional cybersecurity landscape separated the functions of attack simulation (red teams) and defense (blue teams), with each operating independently. While valuable, this approach can leave organizations vulnerable due to missed communication and a lack of understanding of the attacker…
Fortinet Expands Generative AI Integration Across Cybersecurity Portfolio to Enhance Security Operations
Fortinet® (NASDAQ: FTNT), a global leader in cybersecurity, has broadened its application of generative AI (GenAI) technology across its suite of products by introducing two new capabilities through FortiAI, the company’s GenAI-powered security assistant. These latest enhancements are aimed at…
AsyncRAT’s Infection Tactics via Open Directories: Technical Analysis
ANY.RUN, a leader in interactive malware analysis and threat intelligence, has released a technical analysis authored by RacWatchin8872 documenting new techniques used in multi-stage attacks involving AsyncRAT. The report details how attackers exploit open directories to distribute AsyncRAT, examines the…
American Oilfield supplier Newpark Resources hit by ransomware attack
Newpark Resources, a Texas-based company providing essential tools and services to the oil and gas industry, as well as the construction sector, was recently targeted in a ransomware attack that disrupted its financial and operational analytics systems. The attack, which…
New Malware “ToxicPanda” Targets Android Devices to Steal Banking Information
A newly discovered malware, dubbed ToxicPanda, has recently been making headlines for its dangerous activities targeting Android phone users. This sophisticated piece of malware is specifically designed to steal sensitive financial information, primarily targeting users’ bank account details. ToxicPanda operates…
Google Cloud makes MFA mandatory for all global users by 2025
As the frequency and sophistication of cyberattacks on cloud platforms continue to rise, leading service providers are taking significant steps to bolster security and protect user data. Google, the global leader in search and cloud services, has announced a major…
Meeting CISA’s Memory Safety Mandate: The Role of OT Software Buyers and Manufacturers
Over the past several years, CISA, the Cybersecurity and Infrastructure Security Agency, has released a steady stream of guidance encouraging software manufacturers to adopt Secure by Design principles, reducing customer risk by prioritizing security throughout the product development process. This…
SonicWall Unveils Cutting-Edge Security Solution for Branch and Small Office Environments
On Thursday, November 7, SonicWall is set to unveil a new security solution crafted to meet the specific needs of branch offices and small office/home office (SOHO) setups. With its robust, cost-efficient blend of networking, access, and security capabilities, this…
PRODUCT REVIEW: TXONE NETWORKS FOR PROACTIVE OT DEFENSE
Securing Operational Technology (OT) in today’s industrial environments has never been more challenging, with blind spots like unmanaged legacy assets, transient devices, and unauthorized USBs presenting significant vulnerabilities. To make things worse, OT systems often rely on older, specialized equipment…
Real-Time Protection: How Deep Packet Inspection Enhances Detection and Response
If you want to stay healthy and live a long and prosperous life, you don’t just visit the doctor annually so they can listen to your heart and lungs; you also follow up with lab work to check cholesterol and…
Telegram new content surveillance policy and Cyber Attack on South Korea Defense
Telegram to Cooperate with Law Enforcement on User Data Requests Telegram, once a preferred communication platform for cybercriminals due to its lack of content moderation or monitoring, is set to change its stance. In a move to comply with legal…
Using Human Risk Management to Detect and Thwart Cyberattacks
No matter how strong your defenses may be, determined bad actors will likely find a way to break in. Beyond preventing infiltration, organizations must also employ methods that can identify the presence of bad actors in the network after a…
Serco Hit by Cyber Attack, Disrupting Prisoner Tracking and Transport Operations
Serco, the British multinational known for providing technology services to the military and defense sectors across Europe, has reportedly been the target of a cyber attack. The incident has severely affected the company’s ability to monitor prisoners and track the…
Schneider Electric ransomware attack to cost $125k and more in Baguettes
A little-known cybercriminal group, Hellcat ransomware, has recently gained attention after reportedly attacking Schneider Electric, a French-based energy management company. The group claims to have stolen approximately 60GB of data, threatening to release 40GB of it on the dark web…
The Most Notorious Cyber Threat Groups: A Global Overview
In the digital age, cyber threats have evolved from isolated incidents to organized, sophisticated attacks that can target governments, corporations, and individuals worldwide. Among these threats are cybercriminal groups, state-sponsored hackers, and hacktivists that operate under various motives—ranging from financial…
Nokia starts investigating source code data breach claims
Nokia has recently initiated a thorough investigation into claims of a cyberattack allegedly carried out by a hacking group known as IntelBroker. The group has been circulating sensitive information on the internet for the past three days, raising alarm bells…
Three UK Council websites hit by DdoS Cyber Attacks
Three UK councils—Salford, Portsmouth, and Middlesbrough—were disrupted by a Distributed Denial of Service (DDoS) attack, causing temporary outages on their websites. The National Cyber Security Centre (NCSC), part of the UK’s GCHQ, has confirmed that the attack was carried out…
How to Make SaaS Backups More Secure than Production Data
In today’s digital landscape, Software as a Service (SaaS) applications have become vital for businesses of all sizes. However, with the increasing reliance on cloud-based solutions comes the heightened need for robust data security. While production data is often fortified…
ChatGPT new search engine features cause data sanctity concerns
ChatGPT, developed by OpenAI and backed by Microsoft, is poised to enhance its functionality this week by integrating search engine capabilities. This update will allow paid users to pose a variety of questions to the AI chatbot, seeking information on…
Gmail Security Challenges Amid Rising Phishing Scams
Gmail, often heralded as one of the most secure email services globally, is currently facing a wave of security-related controversies that have raised concerns among its users. Recent insights from Google’s Threat Analysis team reveal that several Gmail users have…
How Safe Are AI-Powered Laptops When It Comes to Onboard Data Security?
In recent years, the integration of artificial intelligence (AI) into laptops has revolutionized the way we interact with technology. From enhancing user experiences with personalized interfaces to optimizing performance through intelligent resource management, AI has become a significant component of…
Quadrant Launches Free Dark Web Reports to Help Organizations Identify Leaked Credentials and Sensitive Information
Quadrant Information Security (Quadrant), a prominent provider of Managed Detection and Response (MDR) services, has introduced Free Dark Web Reports designed to help organizations detect and manage their exposed credentials and data on the Dark Web. These reports equip organizations…
ANY.RUN Discovers Tricky Phishing Attack Using Fake CAPTCHA
Phishing campaigns relentlessly continue to evolve, utilizing innovative tricks to deceive users. ANY.RUN, the interactive malware analysis service, recently uncovered a phishing attack that takes advantage of fake CAPTCHA prompts to execute malicious scripts on victims’ systems. How the Attack…
How to protect against supply chain cyber risk with automation
The emphasis on securing supply chains against sophisticated cyberattacks has never been more pressing. The supply chain represents a vital artery for diverse industries, from healthcare to manufacturing, yet remains a prime vector for cyber infiltration. In an era of…
2024 Application Security Report -Fortinet
Introduction In today’s digital ecosystem, the expansion of application and API landscapes offers both opportunities and challenges for organizations. Advancements in application development and integration foster unparalleled business agility and innovation but also enlarge the attack surface, creating numerous opportunities…
Medusa Ransomware attack impacts 1.8 million patients
In what could potentially be the largest data breach in the history of pathology labs in the United States, the Medusa Ransomware group has reportedly affected over 1.8 million patients associated with Summit Pathology Laboratory in Colorado. This incident underscores…
Cyber Atttack disrupts NISA DHL Delivery Operations: A Closer Look
On October 31, 2024, NISA, a prominent UK-based grocery store chain, issued a statement addressing a significant disruption in its logistics and delivery operations. The company revealed that its logistics partner, DHL, was hit by a cyber attack that rendered…
How Cypago’s Cyber GRC Automation Platform Helps Enterprises with Compliance Oversight
The Governance Risk and Compliance (GRC) platform market is predicted to see healthy growth for the next five years. A recent market report forecasts a CAGR of 13.64% through 2028. This growth indicates that enterprises acknowledge the importance of GRC…
Preparing IT teams for the next AI wave
Artificial Intelligence (AI) is fast transforming modern businesses, they are now beginning to understand the importance of risk and compliance – not only as regulatory checkboxes but as critical components of successful AI integration. Historically, these activities have been sidelined,…
SecurityBridge Unveils Automated Virtual Patching to Protect SAP Systems from Vulnerabilities
SecurityBridge, the Cybersecurity Command Center for SAP, has launched its latest advancement: Virtual Patching. This innovative feature enhances SAP security by delivering automated protection for unpatched SAP systems starting on SAP Patch Day. Virtual Patching serves as a cross-platform solution…
IBM Data Breach 2024 might be fake
A cyber threat group known as 888 has made headlines by claiming it has successfully infiltrated the servers of International Business Machines (IBM), allegedly stealing around 17,500 rows of sensitive information belonging to both current and former employees. This assertion,…
Facebook alerts users about the ongoing Malvertising Campaign
Social media platforms can quickly become perilous if users neglect fundamental cyber hygiene practices. This concern is particularly relevant for Facebook users, as an alarming malvertising campaign is currently underway that disseminates SYS01Stealer malware. Presently, Facebook is the epicenter of…
Cyber Expert Points SMB Leaders to Patching as Important Tool for Avoiding Attacks
In recent years, the alarming surge in ransomware attacks has left small to mid-sized businesses (SMBs) grappling with unprecedented security challenges. The exponential increase in cyberthreats has not only compromised sensitive data but has also translated into significant downtime and…
Disastrous cyberattacks show organisations need to be more proactive in defence, says Oxylabs
Threat intelligence can help identify a threat actor’s motives, targets, and behaviour, all while isolating threats before causing harm. In September, Transport for London suffered a significant data breach that greatly impacted Londoners. Live data feeds to travel apps have…
Elections and Financial Crime: Navigating a Shifting Landscape
As global elections reshape the political landscape, the future of financial crime regulation and enforcement hangs in the balance. Explore how changing leadership across major economies can influence financial integrity, compliance, and global sanctions, and learn how businesses can proactively…
Establishing Security Guardrails in the Age of Shadow IT
Staying on top of customer expectations in the digital age means adopting new software at a dizzying pace. Enabling a remote workforce also requires provisioning dozens of SaaS apps and online productivity services. Juggling these business imperatives while keeping data…
ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues
Atlanta, Georgia, 30th October 2024, CyberNewsWire The post ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues appeared first on Cybersecurity Insiders. This article has been indexed from Cybersecurity Insiders Read the original article: ATPC Cyber…
Samsung Smart TVs gain FIPS 140-3 Certification related to data security
In recent years, smart televisions have become ubiquitous around the globe, revolutionizing the way we consume entertainment. These advanced devices allow users to access a vast array of internet content with just a click of a remote control. Whether it’s…
How AI Transforms the Employee Experience
Companies expect their investments in AI to unlock worker productivity, improve the customer experience, and boost revenue — but how, exactly, is this going to happen? The devil is in the details, namely, solving for inefficiencies in document workflow. Oft-overlooked,…
US Elections 2024 are super prone to cyber attacks
With only a week remaining until the 2024 U.S. elections, global attention is squarely on America, a nation known for its economic strength. The spotlight isn’t just on the high-profile matchup between former President Donald Trump and current Vice President…
What to Do If Hit by Ransomware
Ransomware attacks are increasingly common, and falling victim to one can be a terrifying experience. If you find yourself in this situation, here’s a step-by-step guide on how to respond effectively. 1. Stay Calm and Assess the Situation •…
The Hidden Threat of Web Scraping and How to Fight Back
Today’s organizations face a daunting challenge: effectively and at scale detecting and preventing web scraping attacks. These attacks, which involve automated data extraction from websites, can have far-reaching consequences, ranging from increased infrastructure costs to the loss of sensitive information…
Stopping bad things from happening to good businesses
Many businesses, particularly smaller ones, often fail to recognise the importance of cybersecurity. Research indicates that most small and medium-sized enterprises invest less than £500 annually in cybersecurity. This underinvestment is typically due to indifference or a lack of understanding.…
Navigating Privacy Concerns on Google Maps: Understanding the Blurring Feature
If you ever find your home appearing on Google Maps, there’s no need to panic about a potential privacy breach. Instead, you can simply click on the “Report a Problem” button, and rest assured that your request will be processed…
Apple iPhone Users Urged to Upgrade to iOS 18.1 for Enhanced Security
Apple iPhone users with models 15 and 16 are strongly encouraged to upgrade their devices to the latest operating system, iOS 18.1. Failing to do so may leave their devices vulnerable to potential hacking attempts, as security gaps can be…
Understanding Cloud Identity Security (CIS)
In today’s digital landscape, where businesses increasingly rely on cloud-based services, ensuring the security of identities within these environments has become paramount. Cloud Identity Security (CIS) is a comprehensive approach to safeguarding user identities, credentials, and access permissions in cloud…
INE Launches Initiative to Optimize Year-End Training Budgets with Enhanced Cybersecurity and Networking Programs
Cary, NC, 28th October 2024, CyberNewsWire The post INE Launches Initiative to Optimize Year-End Training Budgets with Enhanced Cybersecurity and Networking Programs appeared first on Cybersecurity Insiders. This article has been indexed from Cybersecurity Insiders Read the original article: INE…
Educated people becoming prime targets to Cyber Frauds
In examining the global landscape of cyber fraud, it becomes evident that a significant proportion of victims are often educated individuals, well-versed in technology and accustomed to digital payment systems, including wire transfers, card payments, and mobile transactions. This trend…
2024 Cloud Security Report Trend Micro
Introduction Cloud security continues to be a critical concern as organizations increasingly leverage multi-cloud environments to drive business growth and innovation. While cloud technologies offer substantial benefits, they also present significant challenges, including complex security management, evolving compliance requirements, and…
Protecting university students with robust network solutions
As students settle into term time at university, cybersecurity is likely not at the forefront of their minds. However, with 97% of higher education organisations reporting a cyberbreach or attack in the past year, universities must prioritise cybersecurity measures to…
Trending Cybersecurity News Headlines on Google
Google’s Ambitious Leap: AI to Replace Web Browsers? In a bold move that could redefine how users access information online, Google, a subsidiary of Alphabet Inc., is introducing an innovative initiative called Project Jarvis. This groundbreaking project aims to embed…
Key Cybersecurity Trends Every CISO Should be well aware off
In today’s rapidly evolving digital landscape, the role of the Chief Information Security Officer (CISO) is more critical than ever. With cyber threats becoming increasingly sophisticated and widespread, staying informed about emerging cybersecurity trends is essential for effectively protecting an…
PRODUCT REVIEW: Fortra’s Digital Brand Protection Solution
THE GROWING CHALLENGE OF BRAND IMPERSONATION Brand impersonation has become one of the most damaging threats facing organizations in the digital age. It involves malicious actors mimicking a brand’s identity across various online channels to deceive customers, employees, or partners.…
Beware of Shadow AI Haunting Organizations This Halloween
As Halloween approaches, there’s more to be afraid of than the typical ghosts and goblins. In the world of cybersecurity, a new unseen threat is lurking—Shadow AI. Unlike the spooky costumes we see during the season, Shadow AI causes real-world…
Must-have security features in insurance policy management software
Insurance companies from different sectors are striving to automate and streamline policy management, their critical business aspect, so insurance policy management software is now gaining momentum. The insurance policy software market, which was estimated at $4.03 billion in 2024, is…
Groundbreaking AI Engine to Transform Data Compliance and Security Management
AI-based compliance and security management firm Chorology Inc., has introduced a tool aimed at helping businesses manage sensitive data in an increasingly complex regulatory environment. Chorology’s Compliance and Security Posture Enforcement Platform (CAPE) uses a unique AI-driven compliance engine called…
Australia government looses visa holders sensitive details in cyber attack
A cyber attack targeting the database of technology service provider ZicroDATA has reportedly resulted in the leak of sensitive information pertaining to Australian visa holders. The compromised data includes full names from visa applications, phone numbers, dates of birth, driving…
How to Shift Your Cybersecurity Focus from Breach to Impact (& Manage Risk)
The recent cyberattack against Sea-Tac Airport highlights a shift in the cybersecurity landscape—from focusing primarily on data theft and related fallout to understanding the real-world impact of service disruptions. Increasingly, cyber attackers are targeting essential services and critical infrastructure, seriously…
A Preemptive Guide to State Cybersecurity Compliance
Cyberattacks are threatening businesses and governments more than ever, and state legislatures nationwide are scrambling to enact stricter cybersecurity laws. To date, 19 states have either signed or passed comprehensive consumer privacy bills. For cybersecurity professionals, this constantly shifting landscape…
It’s Time to Take Action This Cybersecurity Awareness Month
Just as cybersecurity threats have grown in scale and intensity over the past two decades, awareness efforts have evolved to reflect the current security challenges we face as a nation and global citizens. Cybersecurity is no longer just about updating…
Unlocking Business Growth: The Need for Cyber Risk Quantification
Business decisions hinge on well-calculated risk and high-quality, timely data. Leaders must continually interpret this data, anticipate future needs and solutions, and calculate the associated costs. Ensuring the business has the right skills and resources to provide relevant services and…
Ransomware threat to Apple MacOS devices
All these days, ransomware criminals have predominantly targeted Windows and Linux operating systems, leading to significant disruptions across various sectors. However, a recent survey conducted by SentinelOne reveals a concerning shift in this trend, highlighting the emergence of ransomware specifically…
WhatsApp offers new contact management for data security
In recent times, WhatsApp users have typically followed a straightforward process when it comes to managing their contacts: they would save a contact to their mobile device and then access it through the messaging platform whenever necessary. While WhatsApp has…
2024 Report: Insider Threat
Introduction The landscape of insider risk management continues to evolve rapidly, driven by increasing complexities in IT environments, the adoption of hybrid work models, and the rise in adoption of sophisticated GenAI tools by knowledge workers. This 2024 Insider Threat…
Guarding Digital Assets By Understanding Third-Party Access Risks
Companies depend on external partners to support operations and provide various services. Collaborating with contractors, consultants and auditors is often a necessity. However, the reliance on external resources also creates notable security concerns, as allowing partners to access the network…
Ransomware hackers using cloud service platforms as their playgrounds
In recent years, we have witnessed a significant rise in cybercriminal activities, particularly involving ransomware attacks. These gangs have become notorious for infiltrating networks and encrypting sensitive databases, rendering critical data inaccessible unless a ransom is paid. This extortion tactic…
Trick or Treat? Your Infrastructure Might Be Haunted by Zombie and Shadow APIs
As the season of eerie zombies, shadows, and all things spine-chilling approaches, brace yourself for unexpected visitors at your doorstep. While Halloween is famed for its parade of spooky intruders, these horrors don’t simply disappear when November comes. Many organizations…
DdoS Attack on Russian Foreign Ministry during BRICS summit
In an increasingly interconnected world, it has become a common phenomenon for hackers to orchestrate sophisticated cyber attacks targeting significant global events. The motives behind these cyber offensives often range from gaining notoriety to making a statement about pressing national…
Trick or Treat? Your Infrastructure Might Be Haunted by Zombie and Shadow APIs
As the season of eerie zombies, shadows, and all things spine-chilling approaches, brace yourself for unexpected visitors at your doorstep. While Halloween is famed for its parade of spooky intruders, these horrors don’t simply disappear when November comes. Many organizations…
DdoS Attack on Russian Foreign Ministry during BRICS summit
In an increasingly interconnected world, it has become a common phenomenon for hackers to orchestrate sophisticated cyber attacks targeting significant global events. The motives behind these cyber offensives often range from gaining notoriety to making a statement about pressing national…
Complex controls: Addressing PCI DSS by 2025
PCI DSS 4.0.1 may have been with us for six months now but the reality is that most entities still won’t have made the transition to the new standard in full. This is because the majority of the requirements (51…
Building a Cyber Resilience Framework for Credit Unions
Caught in the digital crosshairs, financial institutions (including credit unions) stand on the front lines of the cybercrime battlefield. These organizations play a vital role in the daily operations of businesses and customers, processing vast amounts of personal and financial…
Can Offline Data Storage Curb Ransomware Attacks?
In an age where cyber threats are an ever-looming concern, ransomware attacks have emerged as one of the most disruptive and financially devastating forms of cybercrime. These malicious attacks encrypt a victim’s data, rendering it inaccessible until a ransom is…
Britain online users should be aware of this Online Job Scam
Beware of Job Scams: A Warning for Job Seekers In today’s digital age, many individuals are seeking opportunities to earn extra income outside of their regular office hours. However, security experts are sounding the alarm regarding a disturbing trend in…
Dutch central bank says to keep cash on hand and Hackers targeting US Elections 2024 with domains
Dutch Central Bank Issues Warning: Keep Cash on Hand In recent weeks, the focus has largely been on the potential threats posed by state-sponsored cyber attacks targeting banks and financial institutions. However, the Dutch Central Bank, known as De Nederlandsche…
INE Security Launches New Training Solutions to Enhance Cyber Hygiene for SMBs
Cary, NC, 22nd October 2024, CyberNewsWire The post INE Security Launches New Training Solutions to Enhance Cyber Hygiene for SMBs appeared first on Cybersecurity Insiders. This article has been indexed from Cybersecurity Insiders Read the original article: INE Security Launches…
Ransomware group demands $30k for not leaking Transak user data
A lesser-known ransomware group known as Stormous has recently issued a warning that it plans to release sensitive data belonging to approximately 57,000 customers of Transak, a cryptocurrency purchasing platform. The group claims that they have obtained sensitive information about…
Best Programming Languages for Hacking in 2025
As technology evolves, so does the landscape of cybersecurity and ethical hacking. By 2025, certain programming languages will continue to stand out for their utility in hacking and security analysis. Here’s a look at some of the best programming languages…
Sophos to acquire Secureworks
In a significant development within the cybersecurity sector, two major players, Sophos and Secureworks, are poised to enter into a pivotal agreement. Sophos, a leading cybersecurity firm, plans to acquire Secureworks for an impressive transaction value of $859 million. This…
Windows 11 passkey transformation will say goodbye to Passwords
As Microsoft approaches the final year of security support for Windows 10, the tech giant has made a noteworthy announcement that raises concerns regarding account security. In a significant shift, Microsoft will soon mandate the use of passkeys, signaling a…
Understanding AI and ML Security in Telecommunication Networks
As telecommunication networks evolve, the integration of Artificial Intelligence (AI) and Machine Learning (ML) has become increasingly vital for enhancing security measures. These technologies provide innovative solutions to combat the sophisticated cyber threats facing modern communication systems, ensuring data integrity,…
AI and cybersecurity – A double-edged sword
The role of AI is being discussed far and wide – from individuals wondering how AI will affect their futures, and industries embracing it to increase productivity and efficiency, to governments wondering how to mitigate the risks of AI while…
AI to power future data privacy breaches
A new report on the cyber risk outlook by global insurer Allianz Commercial reveals that cyber claims have continued their upwards trend over the past year, driven in large part by a rise in data and privacy breach incidents. The…
AI boost to SWIFT banking network helps thwart Cyber Threats
The banking industry and various sectors within finance are increasingly vulnerable to cyber threats. Cybercriminals are constantly on the lookout for weaknesses in these intricate networks, aiming to disrupt services or steal sensitive data. This stolen information can be highly…
Cyber Awareness Month: The End of the VPN Era
It’s Cybersecurity Awareness Month and what better time to, evaluate the security of your organization’s network access solutions? In fact, I’d say this review is essential. Virtual Private Networks (VPNs) have been the cornerstone of remote access and network security…
Cybersecurity Workforce in Crisis
The world faces a critical shortage of cybersecurity professionals, with a new high of 4.8 million unfilled positions globally. This alarming statistic comes from a first look at the 2024 ISC2 Cybersecurity Workforce Study conducted by (ISC)². The report paints…
How Innovations in Clientless SASE Services Redefine Security in Mobile Networks
As organizations continue to incorporate IoT devices and support remote working by allowing employees to use personal mobile devices, securing enterprise mobility has become critical in modern business operations. Mobile devices connecting to networks often lack compatibility with traditional security…
How Organizations Can Avoid Domain Exploitation When “Big News” Breaks
Due to the inherent nature of business, organizations are continuously in motion: There are always new products/brands/services to market. Corporate news will emerge when companies announce they are closing on an acquisition, hosting a promotional event, making a leadership change…
Beware of Starbucks Phishing Scam and China using Quantum tech to break encryption
Starbucks Coffee Lovers Box Phishing Scam Alert Starbucks is making headlines due to a phishing scam targeting its customers with a promise of a free “Coffee Lovers Box.” However, this offer is entirely fraudulent. According to an update from Action…
DDoS Attacks and the Upcoming US Presidential Election
A few weeks ago, Tesla CEO and X (formerly Twitter) owner Elon Musk hosted a friendly conversation on X with former President Donald Trump. The interview was delayed by more than 40 minutes as X experienced technical difficulties. Musk immediately…
Addressing Critical Gaps in Threat Intelligence Sharing
Almost all organisations agree information sharing and collaboration are crucial elements in the fight against cybercriminals. That’s a majority as high as 91% according to respondents from recent research. With so many in favour of teaming up, it looks like…
As Attackers Embrace AI, Every Organization Should Do These 5 Things
AI benefits our society at large in numerous ways, but cybercriminals are using this new technology for nefarious purposes. From gathering data more efficiently to using large language models to craft phishing communications, experienced and novice threat actors are relying…
Amazon helps in nabbing Anonymous Sudan cyber criminals
For the first time in the history of the tech industry, the U.S. Department of Justice (DOJ) has publicly acknowledged the pivotal role of Amazon Web Services (AWS) in the apprehension of two key individuals associated with the hacking group…