China-linked APT31 group was behind the attack on Finnish Parliament
China-linked cyber espionage group APT31 is believed to be behind an attack on the Parliament of Finland that took place in 2020. China-linked cyber espionage group APT31 is believed to […]
FBI warns of PYSA Ransomware attacks against Education Institutions in US and UK
The FBI has issued an alert to warn about an increase in PYSA ransomware attacks on education institutions in the US and UK. The FBI has issued Tuesday an alert […]
Why ‘Thinking Small’ Is the Way to Stop Ransomware and Other Cyber Attacks
By Yuval Baron, CEO at AlgoSec, explains why micro-segmentation is one of the most effective methods to limit the damage of attacks on a network On August 15, 2020, the […]
US DoJ indicted the CEO of Sky Global encrypted chat platform
The CEO of the encrypted communications firm Sky Global has been indicted in the US on charges of facilitating international drug trafficking The head of the Canada-based company Sky Global […]
Protect Your Organisation Against the Threat of Magecart – The Steps Towards Mitigation
By Pedro Fortuna, CTO, Jscrambler Magecart has certainly garnered mainstream media attention over the last couple of years. Perhaps it’s the high profile nature of many of their targets (British […]
The Best Network Protection: Go Deep or Go Broad?
Combining Breadth and Depth Brings Full Protection By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between […]
Detecting Privilege Escalation
By Garret Grajek, CEO, YouAttest During the first half of 2020 alone, over 36 billion records were exposed through various data breaches, with the FBI reporting an increase of 300% […]
Making the Most of Virtual Cybersecurity Events for your Company and the Community
By Trevor Daughney, VP, product marketing, Exabeam With the pandemic and shutdown orders still in full effect in many regions worldwide, moving in-person events to virtual experiences is the reality […]
EU leaders aim at boosting defense and security, including cybersecurity
During a video conference of the members of the European Council, EU leaders agreed on a new strategy aimed at boosting defense and security. During the recent video conference of the […]
Airplane manufacturer Bombardier has disclosed a security breach, data leaked online
Hackers posted data stolen from manufacturer of business jets Bombardier on Clop ransomware leak site following alleged FTA hack. Hackers exploited vulnerabilities in Accellion FTA file-sharing legacy servers to steal […]
The US Government is going to respond to the SolarWinds hack very soon
The US is going to respond to the SolarWinds supply chain attack within weeks, national security adviser Jake Sullivan told CNN. The US will respond within weeks to the devastating SolarWinds […]
Ransomware is Evolving – Agencies Must Prioritize Data Backup
By Nick Psaki, Principal Engineer, Office of the CTO, Pure Storage The threat of ransomware is not new – but we are seeing a renewed focus since the onset of […]
Hackers attempted to poison the water supply of a US city
Pinellas Sheriff revealed that attackers tried to raise levels of sodium hydroxide, by a factor of more than 100, in the Oldsmar’s water supply. The scenario described by Pinellas Sheriff […]
5G Security
Towards trustworthy products for resilient networks By David Soldani, CTSO, Huawei Technologies 5G technologies will be applied to many vertical industries and support various usage scenarios, such as applications […]
The 2021 Perspective – Challenges and Milestones for The VPN Industry
By Sebastian Schaub, CEO and Co-Founder, hide.me VPN The worldwide VPN market is conservatively valued at over $20 Billion and is predicted to nearly double in value over the next […]
The Privileged Credential Security Advantage
By Tony Goulding, Cybersecurity Evangelist at Centrify Over time, a causality has emerged that accounts for the majority of security risks for enterprises: privileged accounts lead to data breaches. So […]
E-Commerce and Lockdown: The Perfect Storm for Cyber Threats
The impact of lockdowns on cybersecurity By Aman Johal, Lawyer and Director of Your Lawyers The UK’s National Cyber Security Centre (NCSC) reported that a quarter of all cyberattacks over […]
A Hybrid Workplace Means New Threats and More Pressure on IT Leaders
By Tim Sadler, Co-founder, and CEO of Tessian Events this year have changed the way we think about work indefinitely. In fact, new research from Tessian shows that only 11% […]
The Coming Security Perspectives
By Milica D. Djekic It appears that today’s world landscape is under constant and chronical attack of security challenges. There is no time in history that was easy and it’s […]
Financial Data Security Risks in The Hands of Online Shops or Intermediary Applications
By Ben Hartwig, Web Operations Executive, InfoTracer Online retail fraud continues to rise year on year. Fraudsters are becoming more sophisticated and although we can put more and more consumer […]
Data Migration Security
What to Know By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]
Learning Hardware Security Via Capture-The-Flag Competitions
By Jason M. Fung, Offensive Security Research Manager at Intel Software security has been studied by many for decades. As attackers find new ways to break through protections, defenders learn […]
Video Intercom Systems Reinvent Building Security
By Melvin Braide, Content Writer Intercom systems have been around for decades, but recently access control solutions have started to incorporate video functionality, surveillance, and two-way calling. In this piece, […]
Nations—Not Individuals—Are After Your IP
By Ryan Benner, Anexinet A recent Wall Street Journal article titled, Russian Hackers Have Targeted 200 Groups Tied to U.S. Election, has Microsoft stating that “Russian government hackers have targeted […]
Cybersecurity Best Practices for End Users
By Jay Ryerse, CISSP, Vice President of Cybersecurity Initiatives, ConnectWise When it comes to cybersecurity, there are a few misunderstandings. Many clients believe that they’re completely secure and risk-free after […]
Emerging Technologies Create A New Line of Defense in The Fight Against Fraud
ARTIFICIAL INTELLIGENCE POWERS VOICE BIOMETRICS FOR A MORE SECURE, FRICTIONLESS CUSTOMER EXPERIENCE By Brett Beranek, Vice President and General Manager, Security, and Biometrics, Nuance Communications A growing number of organizations […]
Emotet Attacks Surge in 2020, but Could Be Prevented
By Dan Piazza, Technical Product Manager, Stealthbits Technologies, Inc. The Emotet malware, originally detected as a banking trojan in 2014, has become one of those most prevalent malware threats in […]
Takeaway from the SANS Institute Attack: Without Proper Care, “Consent Phishing” Can Happen to Anyone
Gamified Training for Security Teams Can Raise Vigilance and Advance Skills to Defend Against the Latest Attack Exploits. By Chloé Messdaghi, VP of Strategy, Point3 Security The SANS Institute, established […]
Data Migration Security
WHAT TO KNOW By Devin Partida, Cybersecurity Writer, ReHack Magazine If you’re planning a data migration soon, there are some crucial things to do to increase the likelihood of keeping […]
Ransomware Is Evolving
These attacks thrive on overprovisioned administrator access. Understanding where data resides, and adopting zero standing privilege is key. By Jeff Warren, General Manager, Products, Stealthbits Technologies, Inc. When most people […]