Category: CyberSecurity-Insiders

Microsoft issues alert on Cactus Ransomware spreading through DanaBOT Ransomware
05
Dec
2023

Microsoft issues alert on Cactus Ransomware spreading through DanaBOT Ransomware

Microsoft, the prominent American technology giant, has issued a cautionary alert regarding the proliferation of Cactus ransomware attacks disguised as…

Killware vs. Ransomware: Key Differences
04
Dec
2023

Britain Nuclear site Sellafield experiences malware cyber attack

Reports confirm that Sellafield, a prominent nuclear site, has fallen victim to a recent malware attack, with initial investigations suggesting…

Identifying Insider Threats: Addressing the Top Five Insider Threat Indicators
04
Dec
2023

Identifying Insider Threats: Addressing the Top Five Insider Threat Indicators

[By John Stringer, Head of Product, Next] Cybersecurity teams work extensively to keep external attackers out of their organization’s IT…

Cyber Attack on NATO and Ransomware Attack on Motel One
04
Dec
2023

Ransomware news currently trending on Google

1.) A cloud computing firm named ‘Trellance‘ recently fell victim to hackers spreading ransomware, causing disruptions and outages for approximately…

How social media scams are draining bank accounts of victims
04
Dec
2023

Understanding Mobile Network Hacking: Risks, Methods, and Safeguarding Measures

In an era dominated by mobile connectivity, the security of mobile networks has become a critical concern. Mobile network hacking…

How social media scams are draining bank accounts of victims
01
Dec
2023

Japan Aerospace Agency hit by ransomware attacks

Japan Aerospace Exploration Agency, commonly referred to as JAXA, recently fell victim to a cyber attack believed to be a…

Google and Meta complain about China’s misbehavior online
01
Dec
2023

Google and Meta complain about China’s misbehavior online

In a reminiscent scene of a child complaining to their parents about a friend or schoolmate’s behavior, both Meta and…

Exploitation of Artificial Intelligence AI technology to facilitate password theft
01
Dec
2023

Exploring Secure Alternatives to Traditional Passwords

In an era dominated by digital interactions, the need for robust online security measures is more crucial than ever. Passwords,…

The Evolution of Security: From Signatures to Deep Learning
01
Dec
2023

Unlocking the Full Potential of Unified SASE: An Interview with HPE’s Chris Hines

As organizations pivot toward more distributed and fragmented models of work, cybersecurity measures must adapt to keep pace with the…

Tips to Get Certified in Cybersecurity in 30 Days
30
Nov
2023

Tips to Get Certified in Cybersecurity in 30 Days

Cybersecurity is a constantly expanding field. At the same time, there simply aren’t enough qualified people to fill the available…

WEBINAR: Vulnerability Risk Management - The Lynchpin of Proactive Security
30
Nov
2023

WEBINAR: Vulnerability Risk Management – The Lynchpin of Proactive Security

Join our friends at Forrester and Brinqa on Dec 5 for a live webinar to learn how vulnerability risk management…

Why it’s time for biometric payment cards to hit the mainstream
30
Nov
2023

Why it’s time for biometric payment cards to hit the mainstream

[ This article was originally published here ] Have you ever found yourself in a situation where making a payment…