Tuesday, January 31, 2023
isBuzz

Schools Are A Rising Target For Ransomware Attacks

Schools are a major target for malicious cybersecurity events and ransomware attacks. One reason is they sometimes need more resources or preparation to handle cybercriminal activity. Ransomware events negatively impact a school’s finances, parents, faculty and students. Why Are...
isBuzz

How To Safeguard Your Business From Cybersecurity Stress And Prevent IT Burnout

The number of data breaches and their effects are increasing as more aspects of our lives move online. It’s not surprising that the latest IBM Data Breach report found that the average cost of a hack to businesses has...
isBuzz

The Information Revolution – Revisiting Your DLP 

Data loss prevention (DLP) has been around for well over 15 years. It’s by far the most effective tool for protecting data assets, scanning, and blocking users from sending critical files or sensitive information, such as credit card or...
isBuzz

2022 Cyber Review – Is Your Organisation Ready For 2023

Looking back at 2022 is instructive as you prepare your cybersecurity approach for 2023. Ithelps guide your security approach and helps prepare employees and systems for the yearahead. For example, some state-backed attacks focus on stealing intellectual property fromtechnology...
isBuzz

Third-Party Risk Management: Why 2023 Could Be The Perfect Time To Overhaul Your TPRM Program

Ensuring risk caused by third parties does not occur to your organization is becoming increasingly difficult. Every business outsources some aspects of its operations, and ensuring these external entities are a strength and not a weakness isn’t always a...
isBuzz

Threats of Quantum: The solution lies in quantum cryptography

The race in quantum cryptography is on and people from all walks of life whether academics, business or industrialists, are going to be affected by it. The centuries old approach of encryption still holds importance while communication channels has...
isBuzz

UN Hearing on Proposed Cybercrime Treaty: Legal Measures to Tackle Cybercrimes

The United Nations is holding its first ever global cybercrime treaty this week. The 4th round of this hearing is scheduled this January from 9 – 20 January. The focus of the hearing is “state response to cybercrime ”...
isBuzz

Practical Risk Management – Beyond Certification

Organisations regularly invest in their information security management systems (ISMS). These investments are a cost-of-business and cover the basics of fulfilling regulatory, compliance and certification requirements. However, most organisations implement ISMS based on the ISO framework, creating policies and...
isBuzz

Technical and Legal Risks of ChatGPT: How prepared are we with Laws on AI?

“Generative AI refers to artificial intelligence systems that are capable of generating new content, such as text, images, or audio….One potential risk is related to intellectual property. Generative AI systems may be able to create original works that are...
isBuzz

ChatGPT: An Easy Cybercrime Target For Cyberattacks

As artificial intelligence (AI) becomes more prevalent in our daily lives, it’s essential to consider new technologies’ potential risks and benefits. One such example is ChatGPT, a popular new AI chatbot that has gained significant popularity in a short...
isBuzz

22 Ways To Protect WordPress Website From Cyber Attacks

As a website owner, it is essential to prioritize the security of your WordPress website. Cyberattacks and hacking attempts can compromise sensitive information, disrupt your website’s functionality, and damage your online reputation. To protect your website and your business,...
isBuzz

22 Ways To Protect Your Website From Cyber Attacks

As a website owner, it is essential to prioritize the security of your WordPress website. Cyberattacks and hacking attempts can compromise sensitive information, disrupt your website’s functionality, and damage your online reputation. To protect your website and your business,...
isBuzz

Top 10 Cyber Security Predictions For 2023 Based On Expert Responses

With events that changed the course of the cyber security industry in 2022, some experts believe the frequency and severity will only increase in the coming years. It’s only prudent to be aware of what to expect, and as...
isBuzz

IT Jobs: How To Become An Information Security Analyst

Information security analysts play a crucial role in protecting organizations and individuals from cyber threats and ensuring data and systems’ confidentiality, integrity, and availability. These professionals are responsible for designing, implementing, and maintaining security measures to prevent unauthorized access,...
isBuzz

A Hairs Breadth

Question – What separates a smart businessman from a common criminal? Answer, the breadth of a hair! Consider all those cases we have seen around insider dealing between execrative staff at say, the Bank of England, and the banking...

GitHub says hackers cloned code-signing certificates in breached repository

Enlarge GitHub said unknown intruders gained unauthorized access to some of its code repositories and stole code-signing certificates for two of its desktop applications: Desktop and Atom. Code-signing certificates place...
Security Affairs

QNAP addresses a critical flaw impacting its NAS devices

Taiwanese vendor QNAP is warning customers to install QTS and QuTS firmware updates to address a critical flaw impacting its NAS devices. QNAP released QTS and QuTS firmware updates to address a critical vulnerability, tracked as CVE-2022-27596 (CVSS v3 score: 9.8), that...
The Register

Chromebook SH1MMER exploit promises admin jailbreak

Schools' laptops are out if this one gets around, but beware bricking Users of enterprise-managed Chromebooks now, for better or worse, have a way to break the shackles of administrative control through an exploit called SHI1MMER.…

MusicLM: Google AI generates music in various genres at 24 kHz

Enlarge / An AI-generated image of an exploding ball of music. (credit: Ars Technica) On Thursday, researchers from Google announced a new generative AI model called MusicLM that can create...

Russia's Sandworm APT Launches Swarm of Wiper Attacks in Ukraine

The incidents are the latest indication of the growing popularity of dangerous disk wipers, created to disrupt and degrade critical infrastructure and other organizations.