[By Lydia Zhang, President and Co-founder of Ridge Security] Organizations face constant threats from vulnerabilities that can exploit their systems and compromise sensitive data. Common Vulnerabilities and Exposures (CVEs) are one such concern, posing significant risks to organizations of all…
Category: Cybersecurity Insiders
North Korea launches cyber-attacks on Semiconductor industry
North Korea, under the leadership of Kim Jong-un, faces stringent sanctions from Western nations, exacerbating the nation’s dire shortage of semiconductor equipment crucial for its nuclear, satellite, and intelligence operations. In response to this scarcity, North Korea has intensified its…
Don’t Believe the Hype: Myth-busting Zero Trust Marketing
[By Rob McNutt, SVP Network Security at Forescout] The greatest threat to zero trust is not among a group of the usual cybersecurity suspects. It is the marketing hype that has led to unrealistic expectations about its capabilities. The ability…
Proactive Patching Translates into Less Ransomware Payouts
[By Joao Correia, Technical Evangelist at TuxCare (www.tuxcare.com), a global innovator in enterprise-grade cybersecurity for Linux] Today’s threat actors are driven by a variety of potential motivators for attacking systems and networks. They may aim to disrupt entire economies, advocate…
American Express Customer Data Compromised in Third-Party Service Provider Breach
In a concerning development for financial security, American Express has announced that its customers’ credit card information has been compromised in a data breach. The breach occurred through a third-party service provider, marking another significant event in a series of…
Can ban on ransom payments block ransomware spread
Recently, the FBI initiated a global operation aimed at disrupting the infrastructure utilized by the ALPHV hackers responsible for spreading ransomware. Despite this effort, the criminal group managed to bounce back swiftly and launched even more sophisticated attacks. Just a…
AI-Fueled Cyber-Attacks: A Growing Threat to Critical Infrastructure
In recent years, the landscape of cyber threats has evolved dramatically, with the emergence of AI-powered attacks posing new and formidable challenges. MIT security researchers have made significant strides in simulating cyber-attacks capable of triggering physical damage to vital infrastructure,…
Hackers simulating cyber-attacks in labs
It’s quite alarming to hear about the advancements in cyber-attacks, especially those fueled by AI and capable of causing physical damage to critical infrastructure like dams. The intersection of technology and security has always been a double-edged sword, offering both…
8 Tips To Protect Your Organization in the Evolving SaaS Landscape
[by Yoav Kalati] Today, we’re seeing the growing dependence on and adoption of Software as a Service (SaaS) tools by businesses and organizations. However, this increased reliance also has posed challenges on the security front, as threat actors try to…
Healthcare Software Security: Standards and Challenges
Digital healthcare has been developing rapidly during the last decade: the enactment of the American Reinvestment and Recovery Act (ARRA) in 2009 drove the majority of healthcare organizations in the US to adopt the EHR system, the COVID-19 pandemic boosted…