Tag: Cybersecurity Insiders

What Risk Managers Need to Know About SIG 2025

During geopolitical tensions, supply-chain uncertainties, and fast-moving regulatory changes, organizations accelerate their risk-management programs, especially when mitigating risks inherent in business relationships with other organizations. With so many challenges and headwinds to face, risk managers are increasingly pressed to use…

How AI Agents Keep Defenders Ahead of Attackers

Most organizations today struggle with the basic of things. They don’t know how many endpoints they have on their network. They don’t know if they have antivirus installed. If they get a simple alert they don’t know its cause or…

The Governance Model Required for Success in the Era of AI

A recent survey revealed that nearly three-quarters of business leaders plan to implement generative AI within the next 12 months. However, almost 80 percent were not confident in their ability to regulate access and governance of these AI applications, citing…

Future-Proofing Digital Payments: Five Strategies for AI-Driven Security

AI is rapidly transforming digital payments, revolutionizing money movement, and enhancing fraud detection. However, cybercriminals are using the same technology to launch deepfake scams, synthetic identities, and adaptive fraud techniques that evade traditional defenses. To outpace these evolving threats, financial…

AI Cyber Attacks to intensify on organizations

AI-driven cyberattacks targeted more than 87% of organizations in 2024, according to a study conducted by SoSafe, a German cybersecurity platform that helps enhance employee awareness of cybersecurity threats. The SoSafe 2025 Cybercrime Trends report highlights that 91% of security…

Avoiding the Single Point of Failure

In July of 2024, cybersecurity software company CrowdStrike pushed an update to millions of computers around the world. The update, which should have been perfunctory, caused widespread chaos as computers at airlines, hospitals, and other critical industries began to crash,…

North Korea exploits GitHub with fake profiles and Insider Threats

North Korea has long been recognized for its sophisticated cyber operations, particularly targeting financial institutions and cryptocurrency databases to fund its nuclear and ballistic missile programs. In addition to these high-profile cyberattacks, North Korean hackers have increasingly adopted more subtle…

Can Tokenization Help Secure Payment Data for Financial Institutions

Tokenization is increasingly being recognized as a powerful security measure for protecting sensitive payment data within financial institutions. By replacing sensitive information, such as credit card numbers or bank account details, with randomly generated “tokens,” tokenization reduces the risk of…

DDoS Attack on Beeline Russia

Beeline, one of Russia’s largest telecommunications providers, recently experienced a significant cyber attack, which experts believe to be a Distributed Denial of Service (DDoS) attack. The primary target of this assault was Beeline’s IT systems, though, fortunately, the attack did…

CISA issues warning against Qilin ransomware group

A day after rejecting claims that the US government had ceased surveillance operations against Russia and its affiliated threat groups, the Cybersecurity and Infrastructure Security Agency (CISA) issued a clarification regarding statements made by Defense Secretary Pete Hegseth. The clarification…

Pros and Cons of Using AI in Cybersecurity

In today’s digital age, cybersecurity is more critical than ever before. With the increasing sophistication of cyberattacks and the expanding volume of data that organizations must protect, the integration of Artificial Intelligence (AI) in cybersecurity has emerged as a powerful…

Russia not a cyber threat to the United States

In recent years, media outlets across the United States have heavily reported on the rising concerns surrounding Russia, portraying it as one of the nation’s primary cyber adversaries. Over the past three to four years, Russia has been widely accused…

Metrics That Matter for CISOs

With security budgets tightening and business leaders taking a more watchful eye toward cybersecurity, security operations leaders are increasingly looking to justify their work with key performance indicators. But the question remains: Which metrics matter most? Earning a seat at…

Business Continuity Planning: Scenarios vs. impact

The core aim of Business Continuity Planning is to ensure that an organisation can continue to deliver its products and services, minimise downtime and recover swiftly when faced with disruption. There is a fundamental question, often posed when organisations begin:…

Cyber Attack news headlines trending on Google

Nearly 2 Million Android TVs Infected with Malware, Triggering Cybercrime Campaigns Cybersecurity firm Xlab has recently reported that nearly 1.59 million Android-based smart TVs have been compromised by Vo1d malware, leading to the formation of a large botnet. This botnet…

Can Passwordless Tactics Help Thwart Major Cyber Threats?

In today’s digital landscape, cybersecurity has become an ongoing concern for organizations and individuals alike. As cyberattacks evolve in sophistication, one of the most significant vulnerabilities remains the traditional password-based authentication system. Passwords, once a cornerstone of online security, are…

Orange data breach details after HellCat Ransomware Attack

Orange Group, a telecom services provider based in France, has confirmed that one of its internal systems at its Romanian branch was breached by a cyber attacker identified as “Rey,” an individual reportedly associated with the HellCat ransomware group. The…

Overcoming Critical AI Security Risks Uncovered in DeepSeek-R1

DeepSeek has taken the AI world by storm, surpassing ChatGPT as the most downloaded smartphone app and gaining rapid adoption due to its efficiency and accessibility. While its advancements in AI reasoning and performance optimization are impressive, security researchers, including…

Top Mobile Security Courses for App Developers

As the demand for mobile applications continues to soar, so does the importance of ensuring their security. With cyber threats becoming increasingly sophisticated, app developers must stay ahead of potential vulnerabilities and protect user data from malicious attacks. For developers…

Kaspersky ban across Australia government agencies

In June of last year, under the leadership of then-President Joe Biden, the United States became the first nation to implement a sweeping ban on Kaspersky products and services, prohibiting their use across all federal agencies. This move, driven by…

How Password Managers Enhance Security in Corporate Networks

In the digital age, corporate networks face an ever-growing number of cybersecurity threats, making password management a critical component of an organization’s security strategy. Password managers serve as essential tools for improving security, streamlining access control, and reducing the risks…

Responsible AI: The Critical Competitive Advantage of 2025

Artificial intelligence (AI) has reached an inflection point. Once considered an experimental technology, AI is now embedded in the core strategies of organizations across industries, transforming how businesses operate, innovate and compete. As AI becomes integral to decision-making and customer…

State of Secure Network Access 2025

Exploring the Future of SASE, SSE, Zero Trust, and Hybrid Security Strategies Overview As organizations continue to manage increasingly sophisticated IT environments and widespread hybrid work models, the demand for secure, scalable network access remains a top priority. This 2025…

Ghost Ransomware targeting Obsolete IT Systems

A joint report from the FBI and CISA has revealed that the Ghost Ransomware group has been targeting businesses running outdated hardware and software. Since 2021, the gang has victimized multiple organizations in over 70 countries, including China. According to…

Zero Trust Architecture a priority to President Donald Trump

Nearly six months ago, the Western media began to highlight growing concerns about potential Chinese interference in critical U.S. infrastructure. Among the sectors most affected were the telecom and treasury industries. These reports sent waves of alarm throughout the United…

How to thwart cyber attacks on connected cars

The rise of connected cars, equipped with internet connectivity, advanced sensors, and integrated technologies, has revolutionized the automotive industry, offering enhanced convenience, safety, and entertainment. However, this digital transformation has also introduced a new and growing threat: cyberattacks. As connected…

Cybersecurity Jobs in Most Demand in 2025

With the rapid expansion of digital transformation and the increasing sophistication of cyber threats, the demand for skilled cybersecurity professionals continues to rise. Organizations across industries are prioritizing security to protect sensitive data, infrastructure, and operations from cyberattacks. As we…

A Guide to Mitigating Holiday Cyber Risks

The holiday surge in online activity, driven by eager consumers seeking the best deals, often creates a smokescreen for sophisticated threats that can lead to substantial financial losses, reputational damage, and even account takeovers.  For consumers, this increased online activity…

Safer Internet Day – Getting Serious With Passwords

To celebrate Safer Internet Day (SID) and raise further awareness around promoting the safe and positive use of digital technology for the theme “Together for a better Internet,” we’ve decided to focus on a critical element within security that many…

Democratizing Cybersecurity for Small IT Teams

A significant number of small businesses remain unprotected against cyber threats due to a lack of dedicated security budgets. Research indicates that 47% of businesses with fewer than 50 employees allocate no budget to cybersecurity, while 51% have no security…

Phobos and 8Base Ransomware criminals arrested by FBI

In a major joint operation, the FBI, in collaboration with the UK’s National Crime Agency (NCA), Europol, and law enforcement agencies from France, Germany, Japan, Romania, Switzerland, Thailand, Spain, and Bavaria, has officially announced the arrest of four European nationals…

Phobos and 8Base Ransomware criminals arrest by FBI

In a major joint operation, the FBI, in collaboration with the UK’s National Crime Agency (NCA), Europol, and law enforcement agencies from France, Germany, Japan, Romania, Switzerland, Thailand, Spain, and Bavaria, has officially announced the arrest of four European nationals…