Category: CyberSecurity-Insiders

AnyDesk hit by ransomware and Cloudflare hacked
27
Feb
2024

IBM offers AI enabled ransomware resilience data storage solutions

Amidst the prevailing wave of Artificial Intelligence technology, IBM has aligned itself with the trend by introducing an AI-driven ransomware…

No formal education is needed for Cybersecurity Professionals say experts
27
Feb
2024

Trending Cyber Attack news headlines on Google

APT29 moves from Government infrastructure towards Cloud Service Providers APT29, also known as Midnight Blizard or Cozy Bear and associated…

Cyber Attack news headlines trending on Google
26
Feb
2024

FTC slaps Avast with $16.5m penalty for selling browser data

It’s indeed concerning when cybersecurity solutions meant to protect users’ privacy end up compromising it instead. The case of AVAST…

Cybersecurity fears trigger Cloud Repatriation
26
Feb
2024

Cybersecurity fears trigger Cloud Repatriation

It’s interesting to see the shift in attitudes towards cloud adoption, especially considering the initial push towards it from figures…

Top 10 Ways to Avoid Cybersecurity Misconfigurations
26
Feb
2024

Planning for Digital Afterlife: Retrieving Data from a Deceased User’s Google Account

Introduction: In our increasingly digital world, managing online accounts and preserving digital legacies has become a critical consideration. When someone…

2024 is Here:  Will This Be the Year We Get Passwords Right?
24
Feb
2024

2024 is Here:  Will This Be the Year We Get Passwords Right?

[By Darren James, Senior Product Manager, Outpost24] Humans have made unbelievable advancements in science and technology that have stretched the…

Repeat Ransomware attacks on 78% of victims who pay
23
Feb
2024

Repeat Ransomware attacks on 78% of victims who pay

In November 2019, the FBI and US-CERT jointly issued a statement advising against ransom payments to hackers, asserting that such…

How to Properly Handle Cyber Security Incident Management
23
Feb
2024

How to Properly Handle Cyber Security Incident Management

[By Chris Debigh-White, Chief Security Officer at Next DLP] The majority of security experts adhere to the “assume breach” paradigm, which…

Cyber Attack news headlines trending on Google
23
Feb
2024

Cyber Attack news headlines trending on Google

Federal Trade Commission Clears X (formerly Twitter) of Data Security Violations Following an investigation into the server operations of X,…

Essential Security Certifications for Consumer Mobile Devices: A Comprehensive Guide
23
Feb
2024

Top 7 best Practices for Mobile Security in a BYOD Environment

In the modern workplace, the Bring Your Own Device (BYOD) trend has become increasingly prevalent, revolutionizing how businesses operate and…

Toshiba and Orange offer quantum secure data transmission with utmost security
22
Feb
2024

Toshiba and Orange offer quantum secure data transmission with utmost security

Toshiba, the Japanese electronics giant, and Orange, a major telecom company, have unveiled breakthroughs in quantum secure data transmission. Their…

Generative AI banned by businesses because of data privacy risks
22
Feb
2024

Air Canada AI Chatbot spreads misinformation only to fetch hefty legal penalty

When attempting to book a flight ticket on an air travel website, it’s common to encounter a chatbot designed to…