APT29 moves from Government infrastructure towards Cloud Service Providers APT29, also known as Midnight Blizard or Cozy Bear and associated with Russian Intelligence, appears to have altered its approach from targeting government infrastructure to focusing on cloud service providers. This…
Category: Cybersecurity Insiders
FTC slaps Avast with $16.5m penalty for selling browser data
It’s indeed concerning when cybersecurity solutions meant to protect users’ privacy end up compromising it instead. The case of AVAST highlights the importance of transparency and accountability in the handling of user data. Users trust these companies to safeguard their…
Cybersecurity fears trigger Cloud Repatriation
It’s interesting to see the shift in attitudes towards cloud adoption, especially considering the initial push towards it from figures like former President Trump. The concept of cloud repatriation, where organizations bring their workloads back in-house from third-party cloud services,…
Planning for Digital Afterlife: Retrieving Data from a Deceased User’s Google Account
Introduction: In our increasingly digital world, managing online accounts and preserving digital legacies has become a critical consideration. When someone passes away, accessing and retrieving data from their Google account can be a sensitive and complex process. This guide aims…
2024 is Here: Will This Be the Year We Get Passwords Right?
[By Darren James, Senior Product Manager, Outpost24] Humans have made unbelievable advancements in science and technology that have stretched the imagination and changed society forever. But one seemingly mundane, albeit crucial, piece of wisdom continues to elude mankind – proper…
Repeat Ransomware attacks on 78% of victims who pay
In November 2019, the FBI and US-CERT jointly issued a statement advising against ransom payments to hackers, asserting that such payments could embolden cybercriminals and exacerbate cybercrime. They urged victims to instead seek guidance from law enforcement or forensic experts.…
How to Properly Handle Cyber Security Incident Management
[By Chris Debigh-White, Chief Security Officer at Next DLP] The majority of security experts adhere to the “assume breach” paradigm, which recognizes the possibility, if not the inevitability, of an attacker gaining access to an organization. This breach could occur through…
Cyber Attack news headlines trending on Google
Federal Trade Commission Clears X (formerly Twitter) of Data Security Violations Following an investigation into the server operations of X, previously known as Twitter, the Federal Trade Commission (FTC) has announced that Elon Musk’s company has upheld user privacy and…
Top 7 best Practices for Mobile Security in a BYOD Environment
In the modern workplace, the Bring Your Own Device (BYOD) trend has become increasingly prevalent, revolutionizing how businesses operate and employees collaborate. While BYOD offers flexibility and convenience, it also introduces significant security challenges, particularly in the realm of mobile…
Toshiba and Orange offer quantum secure data transmission with utmost security
Toshiba, the Japanese electronics giant, and Orange, a major telecom company, have unveiled breakthroughs in quantum secure data transmission. Their innovation shields information transmitted over fiber optic networks from cyber threats of all kinds. The advancement relies on Quantum Key…