[By Phil Robinson, Principal Security Consultant, Prism Infosec] Cyber maturity is all about ensuring the organisation is prepared for a cyber attack and that can only be determined by establishing where the risks lie and whether the controls that are…
Category: Cybersecurity Insiders
Breach Ready: Fortifying Your Defenses in the Age of Cyberattacks
[By Venky Raju, Field CTO, ColorTokens] In today’s highly digitalized and collaborative business environment, the likelihood of a cybersecurity breach is a matter of when, not if. Nearly every high-profile breach reported in the news has been a result of…
Google Chrome now offers phishing and malware protection
For those prioritizing a secure browsing experience, here’s some promising news: Google has announced that Chrome users utilizing the safe browsing mode will now receive automated protection against phishing, malware, and malicious sites. Google, renowned for its commitment to user…
Unveiling the True Purpose of Cyber Fraud Fusion Centers: Strengthening Digital Defense
In the ever-evolving landscape of cyber threats, organizations and governments worldwide are increasingly turning to collaborative efforts to combat the rising tide of cyber fraud. One such initiative gaining traction is the establishment of Cyber Fraud Fusion Centers. These centers…
Zscaler acquires Avalor for $350 million
Zscaler, a prominent player in cloud security, has made headlines with its recent acquisition of Israeli startup Avalor for a hefty $350 million. This move marks the third acquisition by Zscaler in recent times, following the purchases of Canonic for…
Ransomware news trending on Google
Alabama state websites down due to DDoS attacks Alabama state websites experienced a cyber disruption today as several government URLs were targeted by a sophisticated attack initially thought to be a variant of Ransomware but later identified as a Distributed…
Immutable data storage is last line of defense against ransomware
Ransomware attacks continue to escalate annually, prompting security analysts to advocate for strategies to combat the proliferation of malware. One recommended approach is the implementation of immutable data storage systems that are resistant to file-encrypting malware and can withstand sophisticated…
LockBit takedown surges Akira Ransomware Attacks
Following the takedown of the LockBit Ransomware group’s website in ‘Operation Cronos‘ by law enforcement agencies, there has been a notable surge in the activity of the Akira Ransomware group in recent weeks. This rise has been particularly pronounced since…
Organizations issue warning to Ransomware gangs about no money
In recent times, the landscape of cyber threats has been dominated by ransomware attacks, often involving double and triple extortion tactics. However, a new approach is emerging from publicly funded organizations, openly acknowledging their inability to pay ransoms and rendering…
Unseen Guardians: How Submarine Internet Cables in Deep Seas Thwart Cyber Attacks
In the modern digital age, where connectivity is paramount, the world’s reliance on the internet has never been greater. However, with this increased dependence comes a heightened risk of cyber attacks, posing significant threats to national security, economic stability, and…