Monday, September 25, 2023

Almighty Mistakes: The Danger Of Accidental Insider Threats And How To Prevent Them

Insider threats may sound like an act of revenge – disgruntled employees, contractors or partners misusing their access privileges to cause harm to an organisation, most often resulting in the loss of data or access to crucial systems. But...

China Threat Recap: A Deeper Insight

1. Accusation at the Heart of British Democracy Background on the Tory Parliamentary Expert A Tory parliamentary expert on China has been accused of spying for Beijing from a position at the very heart of the seat of British...

Security Breaches Are On The Rise, Here’s How Verified Identities Can Help

There are only three certainties in life. Death, taxes and cybercriminals attempting to steal information they can flip for money. Verizon’s annual Data Breach Investigation Report analyzed more than 23,000 security incidents that occurred in 2022 alone, demonstrating just...

Step Up Your Defense Against Cloud-loving Cybercriminals

Cybercriminals are capitalizing on a burgeoning opportunity, akin to a modern-day Gold Rush. With the escalating trend of enterprises migrating their data and applications to cloud environments, the potential for cloud-based cyberattacks continues to expand exponentially.   More cloud...

What is Software Localization: Everything You Need to Know!

In today’s interconnected world, software has become an integral part of our daily lives. From the apps on our smartphones to the software running on our computers, software applications have a global reach. However, as the world becomes more...

Which Is Better For File Security: Cloud Or NAS Backup?

Introduction In today’s digital age, data security is paramount, with individuals and businesses alike seeking reliable methods to safeguard their valuable files and information. Two popular options that have gained significant attention are Cloud Backup and Network Attached Storage...

How Do Microsoft Azure and Amazon AWS Differ From One Another?

In the rapidly evolving landscape of cloud computing, Microsoft Azure and Amazon Web Services (AWS) stand out as two of the most prominent and widely adopted cloud platforms. As businesses increasingly shift their IT infrastructure to the cloud, understanding...

Three Persistent Data Security Challenges Organizations Need To Address Now

When it comes to cybersecurity, bad actors never stand still. As a result, neither can today’s security professionals, technology providers and data privacy legislators. Indeed, an attacker now needs just 102 minutes to begin to move laterally once they have compromised...

Why It’s Time To Remove Local Admin Rights For The Safety Of Organisations

The idea of removing local admin rights from every single user in your organisation is likely to spark strong reactions. But local admin privileges are like juicy colourful fruit waiting to be picked by threat actors and used to...

Duolingo Data Breach: 2.6 Million Users At Risk Of Targeted Phishing Attacks

In a startling revelation, the personal information of over 2.6 million Duolingo users has been compromised and posted on a hacking forum. The breach has led to the unauthorized scraping of sensitive user data, including usernames, email addresses, and...

St Helens Council Targeted In Suspected Ransomware Attack

St Helens Borough Council in Merseyside has fallen victim to a suspected ransomware attack, according to an official statement released on Monday, August 21. The local authority has described the incident as a “complex and evolving situation,” with cybersecurity...

Tesla Data Breach Exposes Personal Information Of Over 75,000 Individuals: Inside Job By Former Employees Confirmed

In a startling revelation, Tesla, the Austin, Texas-based electric carmaker, has confirmed that a data breach in May this year led to the exposure of personal information of over 75,735 individuals. Details of the breach were disclosed on Monday,...

Energy One Cyberattack: Key Systems In Australia And UK Compromised – Immediate Actions Taken And Investigation Underway

In a significant incident that has raised alarm within the energy sector, Energy One, a prominent wholesale energy software provider, revealed on Friday, 18 August 2023, that certain corporate systems in Australia and the United Kingdom were affected by...

What’s Beyond SASE? The Next Steps

In an era where cybersecurity is paramount, the emergence of Secure Access Service Edge (SASE) has revolutionized network protection. However, as technology advances at an unprecedented pace, the question arises: What lies beyond SASE? This article delves into the...

How To Build A Company-Wide Data-Driven Culture

A data-driven culture is a mindset, a philosophy that encompasses more than mere data collection. It signifies an entire organization’s shift, where every decision is underpinned by data analytics, evidence, and insights, rather than merely relying on intuition or...
Infosecurity Magazine

BEC Scammer Pleads Guilty to Part in $6m Scheme

Nigerian was extradited to the US from Canada
Infosecurity Magazine

Researchers Spot Novel “Deadglyph” Backdoor

Malware is linked to UAE-backed spies
Infosecurity Magazine

Almost US 900 Schools Breached Via MOVEit

National Student Clearinghouse reveals more details of incident

Don’t Get Burned by CAPTCHAs: A Recipe for Accurate Bot Protection

Traditional CAPTCHAs, such as reCAPTCHA, no longer protect online businesses adequately. Real users hate them. Bots bypass them. It's time to upgrade.
The Hacker News

New Report Uncovers Three Distinct Clusters of China-Nexus Attacks on Southeast Asian Government

An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the region over extended periods of time. "While this activity occurred around the same time and in some instances even simultaneously...