[By Jacqueline Faerman, PR Manager, Privacy Bee] In 2024, many organizations operate with a newly expanded attack surface. Even though most already invest significantly in cybersecurity. All companies are acutely aware of the threat posed by cyberattacks and the resulting…
Category: Cybersecurity Insiders
Exploring SASE and SSE Roadmaps with the Two Taylor Swifts of the Decade – AI and Quantum
[John Spiegel, Director of Strategy, Field CTO, Axis Security] Exploring the SASE and SSE landscape is a daunting task. With over 30 vendors in the space, each with a point of view, it is easy to get lost in both…
Understanding and Shrinking Attack Surfaces: A Comprehensive Guide for Organizational Leaders
In 2024, many organizations operate with a newly expanded attack surface. Even though most already invest significantly in cybersecurity. All companies are acutely aware of the threat posed by cyberattacks and the resulting data breaches. And sadly, many have already…
Meet the Phishing service platform named Darcula
Cybersecurity analysts at Netcraft, an internet service company based in London, have recently uncovered a sophisticated phishing platform dubbed ‘Darcula.’ This platform, known as a phishing-as-a-service (PhaaS) operation, provides users with template-based guidance for setting up phishing websites. What sets…
Hot Topic customers targeted by Credential Stuffing attacks
Hot Topic, the American fashion retailer, experienced two waves of credential stuffing attacks in November of the previous year. Investigations have revealed that these attacks resulted in the leakage of customer information, including partial payment data. Credential stuffing involves hackers…
ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On
In a decisive move against the escalating wave of cyber threats, ThreatHunter.ai has announced a groundbreaking initiative to offer its advanced cybersecurity services free for 30 days to all organizations. This bold step comes in response to the alarming increase…
Understanding the Surge in Cyber Kidnapping: Exploring the Factors Behind the Rise
In recent years, the world has witnessed a concerning uptick in cyber kidnappings, with individuals, organizations, and even governments falling victim to this malicious form of digital extortion. This article delves into the multifaceted reasons contributing to the rise of…
C2A Security’s EVSec Platform: Driving Cybersecurity Compliance in the Automotive Industry
The automotive industry is under pressure to comply with a variety of cybersecurity regulations and standards, including UN Regulation No. 155, ISO/SAE 21434, and Chinese GB Standards. The year 2024 marks a crucial period for these regulations, especially UN Regulation…
NHS patient data published on the Dark Web
In a concerning development, a well-known ransomware collective known as INC Ransom has recently disclosed a portion of pilfered data linked to the UK’s National Health Service (NHS) on the obscure corners of the internet known as the dark web.…
The human-AI partnership: a guide towards secure coding
[Pieter Danhieux Co-Founder and CEO, Secure Code Warrior] The doomsayers are, so far, losing the argument. The panic around AI replacing humans has been countered with a new narrative: “Let AI redefine your job rather than replace it.” According to…