Category: CyberSecurity-Insiders

Holger Schulze
21
May
2025

The End of VPNs — Part 2: Beyond the Buzz of Zero Trust

[Part 2 of 2 – Based on an interview with Zscaler CSO Deepen Desai] By Holger Schulze, Cybersecurity Insiders “Zero…

Naveen Goud
21
May
2025

Google Warns Users About Phishing Scam Targeting 2 Billion Active Accounts

Google has recently issued a security alert regarding a sophisticated phishing scam that is targeting its massive user base of…

Naveen Goud
21
May
2025

Catfishing via ChatGPT: A Deep Cybersecurity Concern

The rapid advancement of artificial intelligence (AI) and natural language processing technologies has revolutionized the way we interact online. Tools…

Jane Devry
21
May
2025

The Cybersecurity Gap Is No Longer Talent—It’s Tempo

It sounds like an exercise in theory: what if a researcher could prompt an AI to reverse-engineer a vulnerability, locate…

Jane Devry
21
May
2025

It’s Time to Move Away from the “Phonebook” Approach to Cybersecurity

Database expert Dominik Tomicevic highlights the limitations of traditional cybersecurity defense methods and why knowledge graphs could be a better…

Naveen Goud
20
May
2025

Ransomware attack on UK Food Distributor to supermarkets

In a troubling development, a new victim of ransomware has emerged today, targeting a key food distributor that supplies refrigerated…

Naveen Goud
20
May
2025

UK Cyber Crime takes a new turn towards TV show the Blacklist

Cybercriminals in the UK have recently shifted their attention to a new, high-profile target: UK retailers. This marks a significant…

Jane Devry
20
May
2025

Engineering Calm in Crisis: Lessons from the Frontlines of Security

High-pressure incidents can be defining moments for organizations, demanding immediate, coordinated, and often high-stakes responses. In the realm of cybersecurity,…

Jane Devry
20
May
2025

The Rise of Shadow Apps: How Rogue Spreadsheets Are Undermining Your Business

Expert reveals “the reason why shadow apps are multiplying rapidly is because it’s often faster to fix workflow issues that…

Jane Devry
20
May
2025

Honeypots become a strategic layer in cyber defence

J2 Software has introduced ‘Honeypot as a Service’, a plug-and-play solution designed to deceive attackers, gather critical threat intelligence, and…

Naveen Goud
20
May
2025

How a Turing Test Can Curb AI-Based Cyber Attacks

In recent years, artificial intelligence (AI) has emerged as a powerful tool, revolutionizing industries from healthcare to finance. However, as…

Jane Devry
20
May
2025

Recent Evolution of Browser-based Cyber Threats, and What to Expect Next

In 2024, browser security faced some of the most advanced cyber threats to-date. As enterprises continue to transition to and…