Category: Cybersecurity Insiders

Defining and Understanding Trust Assurance

Trust is perhaps the most foundational principle that shapes how businesses operate. It’s important to customers, partners, employees, and just about any stakeholder you can think of. The process of building, earning, and keeping trust for an organization is quite…

PRODUCT REVIEW: Safous Zero Trust Access

The Safous Zero Trust Access (ZTA) solution emerges as a comprehensive cybersecurity platform, designed to  tackle the growing challenges enterprises face in protecting digital assets in an increasingly interconnected and  dynamic world. With the rise of remote work, BYOD policies,…

FBI says Akira Ransomware group raked $42 million

The FBI, in collaboration with CISA, Europol European Cybercrime Centre, and the Netherlands NCSC, has issued a stark warning regarding the Akira Ransomware gang, which has amassed a staggering $42 million from approximately 230 companies as of January 24th, 2024.…

Possible Cyber Attack on 911 of 4 American States

The 911 emergency services experienced a significant outage in four states—Nebraska, South Dakota, Texas, and Nevada—sending shockwaves through the affected communities. Speculation points to a cyber attack orchestrated by Chinese intelligence, targeting all 50 states. However, only nine states were…

Microsoft and Google are top brands misused to scam users

Online users are increasingly becoming targets of phishing attacks, with hackers exploiting the names of leading technology companies to lure unsuspecting victims into scams that result in financial loss or malware infections. According to research from Check Point technology, scammers…

Microsoft and Google are top companies to scam users

Online users are increasingly becoming targets of phishing attacks, with hackers exploiting the names of leading technology companies to lure unsuspecting victims into scams that result in financial loss or malware infections. According to research from Check Point technology, scammers…