How To Combat the Mounting ‘Hacktivist’ Threat
By Manish Gohil, Senior Associate, Dragonfly The war in Ukraine has seen the emergence of highly-disruptive cyber criminals, motivated less by money than ideology. These…
By Manish Gohil, Senior Associate, Dragonfly The war in Ukraine has seen the emergence of highly-disruptive cyber criminals, motivated less by money than ideology. These…
In the ever-evolving landscape of cyber threats, Medusa Ransomware has taken a bold step by launching a dedicated blog to publish victim details, offering a…
Tura Scandinavia AB allegedly finds itself targeted by the LockBit ransomware group, marking another episode in the company’s history of cybersecurity challenges. This cyberattack on…
By Mirel Sehic, Global Director of Cyber Security, Honeywell In an increasingly digitized world, the looming threat of cyberattacks has cast a shadow over nearly…
As organizations increasingly migrate their operations to public cloud environments, the need for robust security measures has never been more critical. Cloud penetration testing emerges…
For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic (and usually poorly-written) email and fire it out…
Several prominent organizations in Lithuania, including Compensa Vienna Insurance Group, If Insurance, Lithuanian Roads Association, AD REM, INIT, and Balticum, have allegedly fallen victim to…
Adalanche provides immediate insights into the permissions of users and groups within an Active Directory. It’s an effective open-source tool for visualizing and investigating potential…
Juniper Networks has issued its first three security updates for 2024, including a critical bug in its J-Web network management interface. The company said it…
In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common mistakes…
The Commonwealth Director of Public Prosecutions (CDPP) is already handling evidentiary briefs involving the use of deepfakes but is worried at its ability to act…
An Australian data breach victim has detailed two years of misuse of their identity, with relief achieved only by appearing before a magistrate, or registering…