Category: CyberSecurity-Insiders

How to smartly tackle BlackCat Ransomware group
12
Jan
2024

Ransomware wiping out data on tape backups and malware hitting MYSQL Servers

Finland’s National Cyber Security Centre (NCSC) has issued a warning concerning a new wave of cyber threats, with hackers now…

Vodafone network not down by Cyber Attack
12
Jan
2024

A simple guidance on obtaining effective endpoint security

Endpoint Security means securing the endpoints connected to/in a network. And here’s a general guide on how to implement endpoint…

What to do when social media accounts get hacked or impersonated
11
Jan
2024

What to do when social media accounts get hacked or impersonated

In the era of social media, users freely share a plethora of information with their connections and followers, often overlooking…

Network connected wrenches are now vulnerable to Ransomware attacks
11
Jan
2024

Network connected wrenches are now vulnerable to Ransomware attacks

Network-connected wrenches used globally are now at risk of exposure to ransomware hackers, who can manipulate their functionalities and gain…

How to smartly tackle BlackCat Ransomware group
10
Jan
2024

Hackers promise to delete ransomware data for small fees

Hackers have ventured into a novel business tactic that pledges to delete data stolen by ransomware attackers, offering a dubious…

PRODUCT REVIEW: MIXMODE PLATFORM FOR REAL-TIME THREAT DETECTION
10
Jan
2024

PRODUCT REVIEW: MIXMODE PLATFORM FOR REAL-TIME THREAT DETECTION

As cybersecurity threats continue to evolve at an unprecedented pace, organizations are in desperate need of advanced solutions that can…

Vodafone network not down by Cyber Attack
10
Jan
2024

Vodafone network not down by Cyber Attack

When Vodafone users in the UK found themselves grappling with network downtime on their mobile phones, a segment of them…

Protecting Your Digital Space: A Guide on How to Stay Cyber Safe on Social Media
10
Jan
2024

Protecting Your Digital Space: A Guide on How to Stay Cyber Safe on Social Media

In the age of digital inter-connectedness, social media has become an integral part of our daily lives, enabling us to…

The Evolution of Authorization Controls: Exploring PBAC and Its Benefits
10
Jan
2024

The Evolution of Authorization Controls: Exploring PBAC and Its Benefits

[By Gal Helemski, co-founder and CTO at PlainID] There has been a substantial trend toward improvement of authorization capabilities and controls….

PRODUCT REVIEW: ENEA QOSMOS THREAT DETECTION SDK
10
Jan
2024

PRODUCT REVIEW: ENEA QOSMOS THREAT DETECTION SDK

The evolution of network environments towards distributed, cloud-centric architectures in the work-from-anywhere era has brought unique challenges to network security….

REVIEW: ISC2 CERTIFIED CLOUD SECURITY PROFESSIONAL (CCSP) CERTIFICATION
09
Jan
2024

REVIEW: ISC2 CERTIFIED CLOUD SECURITY PROFESSIONAL (CCSP) CERTIFICATION

The Certified Cloud Security Professional (CCSP) is a highly respected cybersecurity certification that addresses the needs of professionals and employers…

How to smartly tackle BlackCat Ransomware group
09
Jan
2024

How to smartly tackle BlackCat Ransomware group

In 2023, the BlackCat, also known as ALPHV ransomware group, achieved remarkable success by nearly accumulating $700 million through the…