Thursday, June 1, 2023
isBuzz

What’s Russia Planning?

Back in March, Microsoft released data suggesting that Russian hacker groups were appearing to be preparing for a renewed wave of cyber-attacks against Ukraine, including a ransomware-style threat to organisations serving Ukraine’s supply lines. At the time, Clint Watts,...
isBuzz

12 Ways To Protect Small Businesses From Cyberattacks

Many small businesses believe they are immune to cyberattacks because of their presumed lack of valuable information (such as customer data or computing resources), but this is far from the truth. The allure of a small business to cybercriminals...
isBuzz

5 Ways Hackers Will Use ChatGPT For Cyberattacks

Picture this: you are a developer working tirelessly to streamline your workflows and keep up with the ever-increasing demands of your organization. But what if the AI and automation tools you rely on to make your job easier could...
isBuzz

Avoiding Reputational Damage by Conquering Insider Threats

Can you buy reputation? Sure you can—who hasn’t clicked on a 5-star item on Amazon with hundreds of (questionably real) reviews? But in times of crisis, that’s a much harder sell. How will you handle a crippling cyber attack?...
isBuzz

How To Avoid Mother’s Day Scams By Protecting Your Purse And Heart

Mother’s Day is a special day celebrated across many countries, including the United States. To commemorate the love and contributions of mothers and mother figures to their families. It most times falls on the second Sunday in May and...
isBuzz

10 Web Development Skillset And Key Abilities You Can’t Ignore

Web development involves building and programming websites and apps. It’s different from web design, which focuses on how websites look. Web developers make sure websites work well and are easy to use. They write code using different programming languages...
isBuzz

FinServ Ahead Of The Pack In API Transformation

The Financial Services industry (FinServ) has left its mark on the API landscape and continues to provide new reasons for innovation. From the first UK bank that pioneered Open Banking to the booming mobile payment industry, FinServ has prompted...
isBuzz

Protecting DevOps Workflow From The Threat Of Malicious Packages

The compound word, DevOps, defines an extensive procedure and culture that comprises the process and technology of software planning/development (Dev) and IT operations (Ops). DevOps has helped shorten the time for organizational system development, improving the running of software while...
isBuzz

8 Top Authenticator App For iOS and Andriod In 2023

Recent data breaches have demonstrated that relying solely on passwords may be insufficient. Hence, the need for online security. A single password is frequently insufficient to protect sensitive data, such as what’s in your bank account or social media accounts. ...
isBuzz

The Importance Of Endpoint Security When Implementing Zero Trust

Increasing numbers of organisations are moving to a Zero Trust security model. The growing frequency and sophistication of cyber threats is driving the popularity of this model which takes a robust ‘never trust, always verify’ approach to security. The...
isBuzz

Optimising Cyber Security Costs In A Recession

Businesses today are facing two acute challenges – the economy and cybercrime. This is forcing CISOs to make some tough decisions about spending. The UK government’s Cyber Security Breaches Survey 2022 found that in the last 12 months, 39% of...
isBuzz

A Comprehensive Look At Email-Based Threats In 2023

It follows that vectors with greater internet exposure will also attract more attention from threat actors. Because of this, malicious actors frequently exploit public email servers, and a wide variety of cyber dangers can spread through them. We found...
isBuzz

Good, Better And Best Security

What does a “good” cyber-security programme look like? How can we, in our role as Chief Information Security Officer (CISO), work to improve the effectiveness of the policies and practices implemented in our organisations? Measuring activity does not necessarily...
isBuzz

Saas Security: The Need For Continuous Sustenance

Data has emerged as a company’s most essential asset in the modern world. Every security team prioritizes protecting sensitive data, but changes to the perimeter have forced teams to adapt how they approach enterprise security. SaaS adoption has skyrocketed...
isBuzz

Tails Operating System: The Means To Privacy and Security On Internet

When it comes to cybersecurity and privacy, people are always on the lookout for solutions that will ensure their safety online. This solution that has been gaining popularity in recent times is the Tails operating system. Tails is a...
The Register

Amazon Ring, Alexa accused of every nightmare IoT security fail you can imagine

Staff able to watch customers in the bathroom? Tick! Obviously shabby infosec? Tick! Training AI as an excuse for data retention? Tick! America's Federal Trade Commission has made Amazon a case study for every cautionary tale about how sloppily...
The Register

Ukraine war blurs lines between cyber-crims and state-sponsored attackers

This RomCom is no laughing matter A change in the deployment of the RomCom malware strain has illustrated the blurring distinction between cyberattacks motivated by money and those fueled by geopolitics, in this case Russia's illegal invasion of Ukraine,...
SC Magazine

We need to refine and secure AI, not turn our backs on the technology 

While the potential poisoning of ChatGPT raises some concerns, we need to take this threat as an opportunity to better refine and secure emerging AI models.
The Hacker News

Active Mirai Botnet Variant Exploiting Zyxel Devices for DDoS Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched critical security flaw in Zyxel gear to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2023-28771 (CVSS score: 9.8), the issue relates to a command injection flaw impacting...
The Hacker News

Urgent WordPress Update Fixes Critical Flaw in Jetpack Plugin on Million of Sites

WordPress has issued an automatic update to address a critical flaw in the Jetpack plugin that’s installed on over five million sites. The vulnerability, which was unearthed during an internal security audit, resides in an API present in the plugin since version 2.0,...