By Matthew DeChant, CEO of Security Counsel In late January, two days into the new administration, the Department of Homeland Security sent out a memo dismissing all private sector experts from its advisory committees, including the Cyber Safety Review Board…
Category: Cybersecurity Insiders
Cyber Attack News: Top Headlines Trending on Google
Malware Impersonating Booking.com Targets Hospitality Sector Microsoft Threat Intelligence researchers have been tracking a cybercriminal group targeting the hospitality industry. Known as Storm-1865, this group is spreading credential-stealing malware, with activities dating back to late 2024. The attackers have created…
FBI alerts Gmail users over Medusa Ransomware
The FBI, America’s federal law enforcement agency, has issued an urgent warning to all Gmail users about an ongoing hacking campaign carried out by the operators of Medusa Ransomware. According to the FBI, this cybercriminal group is notorious for encrypting…
Guardz Reveals Details of an Ongoing Phishing Campaign Exploiting Microsoft 365 Infrastructure
The cybersecurity company empowering MSPs to secure small businesses identified a highly sophisticated Microsoft 365 tenant brand manipulation and disrupted its use against their customers. Guardz, the cybersecurity company empowering MSPs and IT professionals to deliver comprehensive, AI-native cyber protection…
Blockchain and cyber security
The global blockchain security market is projected to grow from an estimated US$20bn in 2024 to $250bn in the next five years as companies leverage the technology to enhance a variety of different processes, but this growth will also reshape…
Cybersecurity in the Age of Scarcity
Ditching ‘More People, More Controls’ for a Smarter Approach With all the layoffs happening in the federal government, the world of cybersecurity has not gone unscathed. At last count, more than 130 positions were cut from the Department of Homeland…
Accelerating Mergers and Acquisitions with Zero Trust Network Access (ZTNA)
Introduction Mergers and acquisitions (M&A) are critical growth strategies for businesses, but they come with significant IT and security challenges. A smooth transition requires the rapid integration of networks, secure access to applications, and the protection of sensitive data. Traditional…
The DevOps Threats Unwrapped: over 502 incidents and 955 hours of disruptions in GitHub, GitLab, Atlassian, and Azure DevOps
502 incidents, including 48 at the highest risk level, resulting in a total of 955 hours of major and critical disruptions – that’s 120 business days… These are the conclusions of The DevOps Threats Unwrapped report prepared by the GitProtect…
Signal fails to address Ukraine cyber threat concerns against Russia
Signal, the popular messaging platform with approximately 108 million active users worldwide, has recently attracted attention for its perceived failure to address cyber threats raised by Ukraine regarding Russian interference. Despite the severity of the allegations coming from Ukraine, the…
How Do US Privacy Laws Affect You and Your Digital Footprint?
Have you ever wondered who’s keeping tabs on all that personal data we hand out online? You know, those pesky “Accept Cookies” pop-ups or the endless sign-up forms that seem to ask for everything but your childhood pet’s middle name.…