Tag: Information Security Buzz

5 Emerging Malware Variants You Must Be Aware Of

The cybersecurity landscape is marked by sophisticated malware strains designed to harvest sensitive data, get a foothold on company networks, and generally wreak havoc. A new report from ReliaQuest examines five malware variants that have recently impacted the threat landscape…

Ransomware Gangs Introduce New EDR-Killing Tool

Sophos researchers have uncovered a new tool, EDRKillShifter, that malicious actors are using to target endpoint detection and response (EDR) systems. The discovery came after an unsuccessful ransomware attack in May. The threat actors deployed the tool to disable endpoint…

Taming Identity Sprawl With a Least Privilege Approach

Remember the Hydra, the multi-headed creature from Greek mythology? Warriors attempting to slay the beast faced a seemingly impossible challenge: when they cut off one head, multiple heads re-emerged. Security teams entrusted with Identity and Access Management (IAM) can relate…

China-linked Attackers Target Russian Govt Entities

Researchers from Kaspersky have detected a series of ongoing targeted cyberattacks on dozens of computers at Russian government entities and IT organizations. The bad actors infected devices via phishing emails with malicious shortcut attachments. These shortcuts were used to deliver…

Malware Loaders Dominate Cybersecurity Threats in 2024

Malware loaders are a significant threat in the cybersecurity landscape, with nearly 40% of all malware observed in critical security incidents involving these specialized tools. Among the most prevalent loaders are “SocGholish,” “GootLoader,” and “Raspberry Robin,” which have been frequently…

Email Security Risk Remains Alarmingly High

A staggering 94% of companies have fallen victim to phishing attacks over the last year, while 91% experienced data loss or exfiltration incidents. It’s not surprising, then, that 95% of cybersecurity leaders are increasingly stressed about email security, particularly phishing…

The Importance of APIs/API Security in Financial Services

In the evolving financial services landscape, Application Programming Interfaces (APIs) have become fundamental tools for facilitating seamless digital transactions and interactions. However, as the reliance on these technologies grows, so does the need for stringent API security. Ensuring the safety…

Passwordless Prescription: The Cure for Healthcare Cybersecurity

The healthcare industry is poised for a cybersecurity transformation, with passwordless authentication at the forefront. Utilizing passkeys and biometrics improves user experience and significantly strengthens data security against contemporary threats such as credential stuffing and MFA fatigue. So says Phil…

Vectra AI Expands XDR Platform

Vectra AI, a provider of AI-driven Extended Detection and Response (XDR) solutions, has expanded its Vectra AI Platform, enhancing its ability to provide Security Operations Center (SOC) teams with a real-time view of their active posture. This expansion leverages the…

Optimizing AWS GuardDuty for Enhanced Security Monitoring

Approximately 2.38 million customers worldwide use Amazon Web Services (AWS) to host and power their cloud-based business assets, per a recent market report. If you’re reading this, you’re probably one of them. With officially over half (50.1%) of the market…

Ransomware Attack Targets Grand Palais, Paris

French cybercrime police are investigating a ransomware attack on the Grand Palais Exhibition Hall in Paris, a venue for Olympic events such as fencing and Taekwondo. According to Reuters, the central computer system of the Grand Palais was targeted, but…

Tech Contractor Exposes Data of 4.6 Million US Voters

A US technology contractor has inadvertently exposed the personal data of 4.6 million voters and election documents from multiple counties in Illinois, sparking significant concerns over election security and voter privacy. The databases, managed by Platinum Technology Resource, were found…

The Illusion of Reputational Damage

In June, the HIPAA Journal reported a story that seems to be the trifecta of insider threat, third party risk, and medical technology risk. A terminated subcontractor employee of a medical transcription service stole at least one million patient records.…

Proficio Unveils ProBAS Breach and Attack Simulation Service

Proficio, a Managed Detection and Response (MDR) provider, has rolled out its ProBAS Breach and Attack Simulation service. The solution “rigorously” tests businesses’ security defenses, to ensure they can prevent compromise events and detect attacks throughout the entire threat detection and…

LianSpy Spyware ‘LianSpy’ Targets Android Users

Security researchers at Kaspersky have uncovered a new Android spyware campaign called LianSpy, which has been used for cyberespionage against targeted Android device users in Russia. The malware, dubbed “LianSpy,” has been in operation since July 2021, quietly harvesting sensitive…

Dark Angels gang scores a record-breaking $75 million ransom

Staff Reporter Over the past year, ransomware attacks have reached unprecedented levels of ambition and boldness, highlighted by a significant increase in extortion attacks. In fact, research from Zscaler ThreatLabz revealed an unparalleled ransom payout of $75 million – the…

The Critical Role of Response Time in Cybersecurity

In today’s digital landscape, cybercriminals pose a perpetual threat to organisations. We are repeatedly reminded of the consequences of inadequate cybersecurity measures. In a cybersecurity breach, response time is critical to mitigating damage. Most cyber-attacks are like wildfires. Without the…

What Every Business Needs to Know About Ransomware

Today’s businesses rely heavily on technology to streamline operations, enhance productivity, and connect with customers. However, this dependency has also opened the door to a growing threat: ransomware attacks. By 2031, the cost of ransomware attacks is estimated to reach…

4 Ways BYOI and Social Login Enhance User Experience

We live in an era where customers demand convenience and instant gratification and want to use their smartphones and mobile devices to access their apps and services instantly. At the same time, trust in established brands such as Google or…

Deepfakes: Distorted Reality and the Growing Threat

Today’s digital era is seeing the line between reality and fabrication become increasingly blurred, thanks to the advent of deepfake technology. Deepfakes are AI-generated videos or audio that convincingly mimic real people, making it appear like they said or did…

Strategies for Merchant Ransomware Protection

Introduction Ransomware attacks have become a significant threat to businesses of all sizes, including merchants who rely on electronic payment systems for their operations. These malicious attacks can lock you out of your critical systems, encrypt your data, and demand…

Why You Should Phish In Your Own Pond

Phishing – that scourge of the internet for several decades now – remains the most popular attack vector when it comes to bad actors trying to get their hands on confidential information. The targets span commercial enterprises, to government agencies (just ask…

12 Indispensable Online Tools for Startup Success

Introduction Starting a new business can be an exciting yet challenging endeavor. As an entrepreneur, you’ll need all the help you can get to streamline your operations, manage your resources efficiently, and reach your target audience effectively. Fortunately, the digital…

Localization Problems: 10 Biggest Challenges and Solutions

10 biggest challenges in localization Introduction As a seasoned localization expert, I have had the privilege of navigating the complex landscape of localization for years. Localization, the process of adapting content to a specific region or culture, is crucial for…

How to Backup Data from NAS: A Complete Guide

Network-attached storage (NAS) devices have become an integral part of modern digital life. These storage solutions provide a convenient way to store and access data from multiple devices over a local network or the internet. While NAS devices are known…

Selecting Sales Intelligence Software in 2023: A Comprehensive Guide

Introduction In today’s hyper-competitive business landscape, staying ahead of the competition and maximizing revenue requires access to accurate, up-to-date information about potential customers and market trends. This is where sales intelligence software comes into play. Sales intelligence software helps sales…

Eleven of the Best Open Source Hypervisor Technologies

Introduction Virtualization technology has revolutionized the way we use and manage computing resources. It allows multiple operating systems and applications to run simultaneously on a single physical server, improving resource utilization, scalability, and flexibility. Hypervisors are at the heart of…

China Threat Recap: A Deeper Insight

1. Accusation at the Heart of British Democracy Background on the Tory Parliamentary Expert A Tory parliamentary expert on China has been accused of spying for Beijing from a position at the very heart of the seat of British democracy…

Simple Guide: Enabling Virtualization on Windows 11

Virtualization is a powerful technology that allows you to run multiple operating systems on a single physical computer. Whether you’re a developer testing different software configurations, a gamer wanting to run Linux alongside Windows, or a professional needing to isolate…

Six ways to safeguard important digital assets

In today’s digital age, our lives are increasingly intertwined with technology. We store important documents, precious memories, financial information, and more in the digital realm. Protecting these digital assets is of paramount importance. Whether you’re concerned about losing valuable data…

Step Up Your Defense Against Cloud-loving Cybercriminals

Cybercriminals are capitalizing on a burgeoning opportunity, akin to a modern-day Gold Rush. With the escalating trend of enterprises migrating their data and applications to cloud environments, the potential for cloud-based cyberattacks continues to expand exponentially.   More cloud usage…

FBI Dismantles QakBot Botnet In Largest-Ever Cybercrime Operation

Operation Duck Hunt Seizes 52 Servers, Over $8.6 Million in Cryptocurrency In a groundbreaking achievement that marks a significant win for global cybersecurity, the FBI, leading a multinational law enforcement coalition, has dismantled QakBot, a notorious malware loader heavily exploited…

Which Is Better For File Security: Cloud Or NAS Backup?

Introduction In today’s digital age, data security is paramount, with individuals and businesses alike seeking reliable methods to safeguard their valuable files and information. Two popular options that have gained significant attention are Cloud Backup and Network Attached Storage (NAS)…

WHICH IS BETTER FOR FILE SECURITY: CLOUD OR NAS BACKUP?

Introduction In today’s digital age, data security is paramount, with individuals and businesses alike seeking reliable methods to safeguard their valuable files and information. Two popular options that have gained significant attention are Cloud Backup and Network Attached Storage (NAS)…

St Helens Council Targeted In Suspected Ransomware Attack

St Helens Borough Council in Merseyside has fallen victim to a suspected ransomware attack, according to an official statement released on Monday, August 21. The local authority has described the incident as a “complex and evolving situation,” with cybersecurity experts…

The Importance of SaaS Backup and Disaster Recovery: Reasons to Consider

In today’s digital landscape, Software-as-a-Service (SaaS) solutions have become integral to the operations of countless businesses. These cloud-based applications offer convenience, scalability, and accessibility like never before. However, with the increasing reliance on SaaS applications, the need for robust backup…

What’s Beyond SASE? The Next Steps

In an era where cybersecurity is paramount, the emergence of Secure Access Service Edge (SASE) has revolutionized network protection. However, as technology advances at an unprecedented pace, the question arises: What lies beyond SASE? This article delves into the evolution…

Tips for Backing Up an Amazon EC2 Instance

In today’s digital landscape, data is invaluable. As businesses and individuals increasingly rely on cloud computing services like Amazon Web Services (AWS), safeguarding data becomes a top priority. Amazon Elastic Compute Cloud (Amazon EC2) is a widely used cloud computing…