Tuesday, September 27, 2022
isBuzz

Netflix-style Ransomware Makes Your Organisation’s Data The Prize In A Dark Subscription Economy

Today’s subscription economy makes accessing nearly any service as easy as hitting enter. The same model has now entered the dark web. The same Netflix-style instant-access menu is now part and parcel of the online criminal’s lifestyle. Ransomware-as-a-Service (Raas)...
isBuzz

Organisations Need To Adopt Predictive And Proactive Threat Detection Software To Counter Cyber-attacks

As technology evolves, we often think of the benefits it can brings to organisations with new software and programmes being created to enhance society as a whole. But we often overlook the fact that these new, innovative products and...
isBuzz

5 Data Privacy Laws That Could Affect Your Business

Data is a vital economic driver that delivers more advancement and value to a company. It has the potential to take them to new heights if handled and studied accurately. However, that same data can also expose businesses to...
isBuzz

Why Cloud Fax Is Better For Secure Data Exchange Than Email

The constantly-evolving email encryption landscape is a tell-tale clue as to email’s vulnerability. Email service providers and encryption software makers must continually up their game because they know organisations use email to transmit their most sensitive content – a...
isBuzz

Ransomware Roulette with Consumer Trust – The Link Between Loyalty And Attacks

While covid lockdowns caused a step-change in ecommerce as businesses turned to and came to rely upon selling online, it also presented more opportunities for cybercriminals to disrupt retail services and steal data. Cybercriminals have been targeting the retail...
isBuzz

Endpoint Security: 7 Best Practices For Mitigating Data Breaches

The move towards hybrid working and digital innovation has changed the way we access data and in turn, it has fueled the growth of endpoints. User devices have multiplied in numbers, as remote workers are no longer relying on...
isBuzz

Cybersecurity’s Too Important To Have A Dysfunctional Team

As technology has become fundamental for businesses across almost all sectors and industries to continue to operate the recruitment and retention of tech talent, in particular coders and software engineers, has become a crucial business battleground. However, many organisations...
isBuzz

How to Make Container Security Threats More Containable

AlgoSec CTO and Co-Founder, Prof. Avishai Wool, provides some useful container best practices to help you do just that As cloud adoption and digital transformation increases, more sensitive data from applications is being stored in data containers. This is...
isBuzz

Why It’s Mission-critical That All-sized Businesses Stay Cyber Secure

A study analysing millions of emails across thousands of companies found that on average, employees of small businesses with less than 100 employees experience 350% more social engineering attacks than employees of larger enterprises. 57% of these are phishing...
isBuzz

Big Banks vs. Big Tech: Who Is Liable For Online Fraud? 

Digitalisation and the immense surge of eCommerce is fostering a dramatic increase in online fraud, particularly authorised push payment fraud (APP). And, with this comes an important question: Who should be liable?   Just over the past year there has...
isBuzz

4 Critical Factors In Software Due Diligence Audits For Mergers & Acquisitions (M&A)

The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally...
isBuzz

79% of the Companies only Invest in Cybersecurity after Hacking Incidents

The British cybersecurity company Tanium published a survey on investments in digital protection in UK companies with alarming results: 79% of them only approve investments in cybersecurity after suffering a data breach; 92% experienced a data attack or breach,...
isBuzz

Privacy Center: How to Take Control of Consumer’s Data?

In the latter half of the 1890s, the idea of privacy received widespread recognition. Since then, privacy has undergone changes, and in the cases where it still applies, it is now deeply ingrained in daily choices and lifestyles. Today,...
isBuzz

What Can We Learn From The OpenSea Data Breach?

Access has always been a conundrum for security professionals. The level of access privileges you give to your employees exposes you to insider threats. The recent data breach faced by OpenSea exposes another layer of risk: third-party vendors, after...
isBuzz

Virginia Consumer Data Protection Act: What You Need to Know?

The United States is a peculiar case as far as its legislative attitude towards data privacy is concerned. That’s primarily because it has no federal or centralized data privacy law. As far as protecting consumers’ digital privacy rights is...
The Register

Ukraine fears ‘massive’ Russian cyberattacks on power, infrastructure

Will those be before or after the nuke strikes Putin keeps banging on about? Russia plans to conduct "massive cyberattacks" on Ukraine and its allies' critical infrastructure and energy sector, according to Kyiv.…

BrandPost: Extortion Economics: Ransomware’s New Business Model

Did you know that over 80% of ransomware attacks can be traced to common configuration errors in software and devices? This ease of access is one of many reasons why cybercriminals have become emboldened by the underground ransomware economy.And...

Police ‘all over’ dark web ransom threat to release 10,000 customer records a day, Optus CEO says

Purported hackers post ultimatum demanding $1m within four days after massive Optus data breachFollow our Australia news live blog for the latest updatesGet our free news app, morning email briefing or daily news podcastThe chief executive of Optus, Kelly...

Barracuda Unveils New Capabilities To Protect Against Persistent And Evolving Threats

Barracuda announced a number of product enhancements and innovative new capabilities at its recent Secured.22 virtual conference to expand the protection for customers and help them defend against the latest cyber threats.

Zoho ManageEngine flaw is actively exploited, CISA warns

A remote code execution vulnerability in Zoho's ManageEngine, a popular IT management solution for enterprises, is being exploited in the wild. The US Cybersecurity & Infrastructure Security Agency (CISA) added the flaw to its catalog of known exploited vulnerabilities...