1.) The ALPHV ransomware gang’s website, which provides information leaks and negotiation details, has been inaccessible for several hours. Telegram sources suggest that law enforcement linked to Euro-pol may have taken down the blog, which is only accessible through TOR.…
Category: Cybersecurity Insiders
A Comprehensive Cybersecurity Audit Checklist: Ensuring Digital Resilience
In an era dominated by digital advancements, the importance of cybersecurity cannot be overstated. Cybersecurity audits play a pivotal role in fortifying an organization’s defenses against evolving cyber threats. Whether you’re a business owner, IT professional, or security enthusiast, conducting…
Microsoft to offer glass based storage tech that is ransomware proof
Microsoft is actively engaged in the development of a glass-based data storage medium slated for integration into its data centers that facilitate Azure Cloud services. This innovative ceramics-based storage solution is specifically designed for archival purposes and is touted to…
Twitter fired its Information Security head for cutting budget on data security and privacy
Elon Musk has been making headlines recently, not only for his contentious remarks against his company’s investors but also for the abrupt dismissal of his Information Security head. The focus of the controversy lies in allegations made by Alan Rosa,…
Guidelines for Secure AI System Development
In an era where artificial intelligence (AI) plays an increasingly pivotal role across various industries, ensuring the security of AI systems has become a paramount concern. As AI technology continues to advance, developers and organizations must prioritize robust security measures…
Log4Shell: A Persistent Threat to Cybersecurity – Two Years On
[By Mike Walters, President and co-founder of Action1] Two years have passed since the cybersecurity world was rocked by the discovery of Log4Shell, a critical vulnerability in the Log4j library. First discovered on December 9, 2021, this legendary flaw exposed…
Getting Ahead of the Attack
[By Matt Wilson, vice president of product management, Netography] Being proactive is always good advice, but being proactive and being prepared when it comes to cybersecurity is a must. With threat actors maturing and constantly changing their methods, security teams…
Star Blizzard launched Cyber Attacks on UK since years
Star Blizzard, a hacking group allegedly sponsored by Russia’s intelligence agency Centre 18, has recently made headlines for engaging in long-term espionage on prominent figures in the United Kingdom, including top politicians, journalists, and bureaucrats. The discovery of this covert…
Why Infostealers are Stealing the Security Spotlight
The cybersecurity landscape is constantly evolving, with bad actors finding new and creative ways to exploit weaknesses. The threat from Malware continues to escalate with infostealers, an increasingly popular variant. Research found that 24% of malware is now infostealers, and…
Sierra Wireless routers are vulnerable to Cyber Attacks
Sierra Wireless, a Canadian company specializing in industrial web connectivity solutions, has recently come under scrutiny due to security concerns. Security experts have identified approximately 21 vulnerabilities in the software of its routers, such as OpenDNS and TinyXML. These vulnerabilities…