Category: CyberSecurity-Insiders

10
Dec
2023

2023 Cloud Security Report

In 2023, the cloud is fundamentally delivering on its promised business outcomes, including flexible capacity and scalability, increased agility, improved…

Cyber Attack on NATO and Ransomware Attack on Motel One
08
Dec
2023

Microsoft to offer glass based storage tech that is ransomware proof

Microsoft is actively engaged in the development of a glass-based data storage medium slated for integration into its data centers…

Twitter fired its Information Security head for cutting budget on data security and privacy
08
Dec
2023

Twitter fired its Information Security head for cutting budget on data security and privacy

Elon Musk has been making headlines recently, not only for his contentious remarks against his company’s investors but also for…

Top 9 AI Certifications for the year 2023
08
Dec
2023

Guidelines for Secure AI System Development

In an era where artificial intelligence (AI) plays an increasingly pivotal role across various industries, ensuring the security of AI…

Log4Shell: A Persistent Threat to Cybersecurity - Two Years On
07
Dec
2023

Log4Shell: A Persistent Threat to Cybersecurity – Two Years On

[By Mike Walters, President and co-founder of Action1] Two years have passed since the cybersecurity world was rocked by the…

Getting Ahead of the Attack
07
Dec
2023

Getting Ahead of the Attack

[By Matt Wilson, vice president of product management, Netography] Being proactive is always good advice, but being proactive and being…

How social media scams are draining bank accounts of victims
07
Dec
2023

Star Blizzard launched Cyber Attacks on UK since years

Star Blizzard, a hacking group allegedly sponsored by Russia’s intelligence agency Centre 18, has recently made headlines for engaging in…

Why Infostealers are Stealing the Security Spotlight
07
Dec
2023

Why Infostealers are Stealing the Security Spotlight

The cybersecurity landscape is constantly evolving, with bad actors finding new and creative ways to exploit weaknesses. The threat from…

Cyber Attack on Norway govt websites identified to Ivanti Security vulnerability
07
Dec
2023

Sierra Wireless routers are vulnerable to Cyber Attacks

Sierra Wireless, a Canadian company specializing in industrial web connectivity solutions, has recently come under scrutiny due to security concerns….

Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program
06
Dec
2023

Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program

[By Perry Carpenter, chief evangelist and security officer at KnowBe4] The threat landscape is evolving with new attack vectors and…

Cyber Threat emerges out of Apple iOS 17 new NameDrop Feature
06
Dec
2023

Cyber Threat emerges out of Apple iOS 17 new NameDrop Feature

Apple’s recent update to iOS 17 introduced a new feature called NameDrop, enhancing data transfer capabilities for iPhone and Apple…

Cyber and Physical Security Are Different, But They Must Work Together
06
Dec
2023

Cyber and Physical Security Are Different, But They Must Work Together

[By Blake Benson, Senior Director – Industrial Cybersecurity Practice at ABS Group] America’s critical infrastructure faces more diverse threats than…