Category: CyberSecurity-Insiders

Cyber Attack news headlines trending on Google
17
Feb
2024

Unseen Threats: Identity Blind Spots and Misconfigurations in Cybersecurity

[By Shlomi Yanai] It’s rather obvious to most in the IT sector that cybercriminals consistently and successfully exploit stolen or…

Firm offers protection layer preventing sensitive data uploaded to ChatGPT
16
Feb
2024

OpenAI ‘upload file’ feature offers data security concerns

The integration of Artificial Intelligence (AI) tools into our daily routines has become an undeniable global phenomenon. However, as these…

Ransomware attack news trending on Google
16
Feb
2024

US State Department offers $10m reward on leads on ALPHV aka Blackcat ransomware

The Department of State, in its ongoing efforts to combat cybercrime, has announced a $10 million reward for information leading…

Difference between Whale Phishing and Spear Phishing
16
Feb
2024

Difference between Whale Phishing and Spear Phishing

Whale phishing and Spear phishing are both forms of targeted cyber-attacks aimed at stealing sensitive information or gaining unauthorized access…

France data breach triggers among half of the populace
15
Feb
2024

SEC admits on Twitter X that security lapses led to account hack

The U.S. Securities and Exchange Commission (SEC) has made a significant announcement regarding the security of its X account, affirming…

Cyber Attack news headlines trending on Google
15
Feb
2024

Cyber Attack news headlines trending on Google

Bank of America Data Breach by Infosys Bank of America (BOA) has filed accusations against Infosys US, alleging a data…

AnyDesk hit by ransomware and Cloudflare hacked
14
Feb
2024

Black Basta Ransomware targets Southern Water

Southern Water, responsible for managing the UK’s water and waste facilities, made an official statement on February 12, 2024, revealing…

No formal education is needed for Cybersecurity Professionals say experts
14
Feb
2024

No formal education is needed for Cybersecurity Professionals say experts

In recent times, the criteria for landing coveted job positions have often included a laundry list of prerequisites: educational qualifications,…

How to maintain security across multi cloud environments
14
Feb
2024

How to maintain security across multi cloud environments

Maintaining security across multi-cloud environments requires a comprehensive approach that encompasses various aspects of security. Here are some key steps…

North Korea raked $3 billion from Ransomware and US offers $10m for Hive
13
Feb
2024

Cybercrime in Scotland upsurges like an Epidemic

Scotland’s police have officially declared a troubling surge in cyber crime within their jurisdiction, indicating a doubling of incidents compared…

Ransomware attack news trending on Google
13
Feb
2024

Top Ransomware news headlines trending on Google

A ransomware assault targeting the Office of Colorado State Public Defender (CSPD) has compelled the IT personnel to shut down…

FTC issues ban on location data and bars information brokers from duties
12
Feb
2024

Spear Phishing attacks on Microsoft365 and Azure Accounts

Microsoft, the renowned technology giant based in the United States, has recently made headlines due to targeted spear phishing campaigns…