[By Perry Carpenter, chief evangelist and security officer at KnowBe4] The threat landscape is evolving with new attack vectors and cyber threats surfacing almost daily. Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that…
Category: Cybersecurity Insiders
Cyber Threat emerges out of Apple iOS 17 new NameDrop Feature
Apple’s recent update to iOS 17 introduced a new feature called NameDrop, enhancing data transfer capabilities for iPhone and Apple Watch users. This update allows seamless sharing of various files, including contacts, messages, photos, and videos. Despite its convenience, security…
Cyber and Physical Security Are Different, But They Must Work Together
[By Blake Benson, Senior Director – Industrial Cybersecurity Practice at ABS Group] America’s critical infrastructure faces more diverse threats than ever before. The rapid digitalization of many sectors and the relatively analog operational environments that exist in others have led…
UK to block all Social Media Scams
Starting May 2024, residents of the United Kingdom can breathe a sigh of relief, as social media platforms operating in the country have collectively committed to combating a range of scams on their respective networks. This includes everything from phishing…
Securing the Cloud: Strategies for CSPs to Mitigate Malware Hosting Risks
In recent years, the prevalence of cloud computing has revolutionized the way businesses operate, offering scalability, flexibility, and cost-efficiency. However, this technological shift has also attracted the attention of cyber-criminals who exploit cloud environments for hosting malware. Cloud Service Providers…
Nine 9 tips before putting your Android Smartphone or Apple iPhone for resale
Many Americans are likely considering selling their old smartphones to upgrade to the latest models released by OEMs, featuring innovative features and new operating systems. However, before selling your smartphone to a friend or a company, it’s crucial to take…
Thinking about a Career in Cloud Security? Follow this Path
As more critical data and assets move to the cloud, they’ve become prime targets for cybercriminals. Organizations worldwide need cloud security professionals who understand the evolving complexities to identify and mitigate security risks. Complicating matters, most are operating under a…
Microsoft issues alert on Cactus Ransomware spreading through DanaBOT Ransomware
Microsoft, the prominent American technology giant, has issued a cautionary alert regarding the proliferation of Cactus ransomware attacks disguised as the Danabot malvertising campaign. The primary goal of this malicious activity is to pilfer sensitive information, including credentials, or serve…
Britain Nuclear site Sellafield experiences malware cyber attack
Reports confirm that Sellafield, a prominent nuclear site, has fallen victim to a recent malware attack, with initial investigations suggesting the infiltration of malicious software dating as far back as 2015. Cybersecurity experts are actively engaged in probing the incident,…
Identifying Insider Threats: Addressing the Top Five Insider Threat Indicators
[By John Stringer, Head of Product, Next] Cybersecurity teams work extensively to keep external attackers out of their organization’s IT environment, but insider threats present a different, equally as difficult, challenge. Identifying insider threats is growing increasingly complex, and, as…