DoJ: Investigations into ransomware attacks must have similar priority as terrorism
The U.S. Department of Justice was to assign investigation on ransomware attacks the same priority as terrorism in the wake of the Colonial Pipeline hack. The U.S. Department of Justice […]
Addressing the Growing Cybersecurity Risks of Cyber-Physical Systems
By Michael Welch, Managing Director, MorganFranklin Cyber Cyberattacks against critical infrastructure and other cyber-physical systems have increased for years. These attacks are particularly concerning because they pose a real threat […]
Why A ‘Layers And Lists’ Approach To Cybersecurity Is Doomed To Fail
By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a barrage of attacks on a single target and keep going until they find […]
Belgium Interior Ministry said it was hit by a sophisticated cyber attack
The Belgian interior ministry was targeted by a “sophisticated” cyber attack, a spokesman told RTBF public television on Tuesday. The Belgian interior ministry was hit by a “sophisticated” cyber-espionage attack, […]
Contactless Passwordless Auto Login
with the most innovative NFC hardware password manager which received the Global Infosec Awards 2021 By Jacques GASCUEL, CEO of Freemindtronic On a daily basis, every company, regardless of its […]
5 Tips to Building a Cyber-Smart Culture
Building a strong cybersecurity culture in your organization is not only possible, it’s a necessity. With cyberattacks spanning critical infrastructure, SMBs, retail organizations, and commercial businesses alike, addressing cybersecurity with […]
Housekeeping Pitfalls of Vulnerability Management
By Srinivas Mukkamala, Co-Founder and CEO, RiskSense Vulnerability management doesn’t always get the attention it needs until it’s too late. Vulnerability management is siloed and is slow to adapt to […]
How to Prevent Ransomware Attacks On Industrial Networks
Insights into Ransomware attacks, how they spread in industrial networks, and how to prevent them from happening. By Michael Yehoshua, VP of Global Marketing, SCADAfence Since the outbreaks of Wannacry & […]
Humans Just Can’t Cut it Anymore
By Peter Stephenson, PhD, CISSP (lifetime), FAAFS (2015-16) Let’s face it, folks… when it comes to interdicting and stopping a cyberattack we’re tortoises racing the hare. When the adversary unleashes […]
Reconnect with the security industry virtually this June
Building on a successful portfolio of in-person and digital events, IFSEC International is preparing for the opening of a brand-new online marketplace and meetings event this June. Running alongside co-located […]
FBI and Australia ACSC agencies warn of ongoing Avaddon ransomware attacks
The FBI and Australian Australian Cyber Security Centre (ACSC) warn of an ongoing Avaddon ransomware campaign targeting organizations worldwide. The Federal Bureau of Investigation (FBI) and the Australian Cyber Security Centre […]
Secure Data Recovery Services: Protecting Business Continuity
By Dmitri Kardashev, Founder and CEO, SecureData, Inc. In today’s world, consumers and businesses alike require consistent and easy access to their data. Whether it’s large customer databases that an […]
Hundreds of millions Of Dell PCs affected by CVE-2021-21551 flaws
American multinational computer technology giant Dell addresses a 12-year-old driver flaw, tracked as CVE-2021-21551, impacting millions of computers. Hundreds of millions of Dell computers worldwide are affected by a 12-year-old […]
Experian API exposed credit scores of tens of millions of Americans
Experian API Exposed Credit Scores of Most Americans could have been accessed due to a weakness with a partner website. Experian API exposed credit scores of tens of millions of […]
Naikon APT group uses new Nebulae backdoor in attacks aimed at military orgs
China-linked APT Naikon employed a new backdoor in multiple cyber-espionage operations targeting military organizations from Southeast Asia in the last 2 years. The Naikon APT group is a China-linked cyber espionage group that has […]
A new Linux Botnet abuses IaC Tools to spread and other emerging techniques
A new Linux botnet uses Tor through a network of proxies using the Socks5 protocol, abuses legitimate DevOps tools, and other emerging techniques. Researchers from Trend Micro have spotted a new Linux botnet […]
Water After Oldsmar
How to Prevent the Next Attack on Our Water Infrastructure By Josh Cohen, Cyber Director, Economic and Trade Mission at the Embassy of Israel to the U.S. To get a […]
How Zero Trust Networks Can Help Curb IT Burnout
By Stephen Helm, Product Marketing Manager, WatchGuard Technologies Last year was a challenging year for IT teams, and tech workers will continue to feel the mounting burden of maintaining business […]
How to Simplify Zero Trust Adoption
By Bhavya Pathak, Product Marketing Manager, ColorTokens Gone are the days when an organization could trust everything within the four walls of its perimeter. Cloud computing, and accelerating digital transformation […]
Microsoft fixes 2 critical Exchange Server flaws reported by the NSA
Microsoft patch Tuesday security updates address four high and critical vulnerabilities in Microsoft Exchange Server that were reported by the NSA. Microsoft patch Tuesday security updates released today have addressed […]
Expert publicly released Chromium-based browsers exploit demonstrated at Pwn2Own 2021
An Indian security researcher has published a proof-of-concept (PoC) exploit code for a vulnerability impacting Google Chrome and other Chromium-based browsers. The Indian security researcher Rajvardhan Agarwal has publicly released […]
Cyberattacks could pose a material risk to water and sewer utilities
Fitch Ratings is warning that cyberattacks could pose a risk to water and sewer utilities potentially impacting their ability to repay debt. Fitch Ratings Inc. is an American credit rating […]
Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe
By Sridhar Iyengar, MD, Zoho Europe Large tech corporations have started turning into surveillance companies, tracking the behaviour of businesses and users who have become heavily reliant on their services […]
This man was planning to kill 70% of Internet in a bomb attack against AWS
The FBI arrested a man for allegedly planning a bomb attack against Amazon Web Services (AWS) to kill about 70% of the internet. The FBI arrested Seth Aaron Pendley (28), […]
Gigaset Android smartphones infected with malware after supply chain attack
A new supply chain attack made the headlines, threat actors compromised at least one update server of smartphone maker Gigaset to deliver malware. The German device maker Gigaset was the victim […]
Firmware attacks, a grey area in cybersecurity of organizations
A new report published by Microsoft revealed that 80% of global enterprises were victims of a firmware-focused cyberattack. Microsoft recently published a report that states, titled “March 2021 Security Signals report,” that […]
Protecting Human Rights in The Era of Cyber Information Warfare
By Edwin Weijdema, Global Technologist, Product Strategy at Veeam Disinformation is undermining the limitless potential of technology to be a positive force for industries, businesses and communities. In the current […]
Growth Strategies for China Must Prioritize WeChat Security
By Otavio Freire, CTO & Co-Founder at SafeGuard Cyber China accounts for almost a quarter of global GDP, and its growing middle class has significant spending power. Across every industry, […]
Rise of BYOD Once Again
By Nicole Allen, Marketing Executive, SaltDNA. The sudden increase in remote working has ensured that ‘bring your own device’ (BYOD) is once again a hot topic, as the workforce relies on a number […]
Secure, Managed File Transfer: What’s Old is New Again
Intrigue and Espionage May not Come to Mind when You Think of MFT—But it Should By Gregory Hoffer, CEO, Coviant Software When you think about secure, managed file transfer (you […]