Tag: Cybersecurity Insiders

Understanding Multifactor Authentication (MFA): A Simple Guide

In today’s digital world, passwords alone are not enough to keep our online accounts safe. Cybercriminals are constantly finding ways to steal login credentials, whether through phishing scams, data breaches or malware. This is where multifactor authentication (MFA) comes in.…

The Oracle Breach Is Bigger Than You Think—5 Urgent Steps to Take Now

In a troubling development for enterprise cloud users, federal authorities are investigating a major data breach involving Oracle—one of the world’s leading cloud infrastructure providers. Hackers reportedly gained unauthorized access to Oracle systems, stealing sensitive client login credentials including usernames,…

Hackers post stolen data on Telegram

In recent years, we’ve become familiar with ransomware attacks, where hackers infiltrate computer networks, encrypt files, and demand payment in exchange for restoring access. As these cybercriminal tactics evolved, attackers began stealing sensitive data in addition to encrypting it—using the…

RansomHouse ransomware steals 2TB data from telecom giant

Ransomware attacks have been on the rise in recent months, likely due to the ease with which hackers can generate substantial earnings through increasingly aggressive tactics, including double and triple extortion. These methods force victims to not only pay a…

Sensata Technologies hit by a ransomware attack

Ransomware attacks are known to frequently occur over weekends, and Sensata Technologies, a prominent manufacturer of sensors and electrical components for critical applications, recently became a victim of such an attack. According to a filing with the U.S. Securities and…

The Cybersecurity Risk No One Talks About: Poor File Management

Cybersecurity discussions often spotlight phishing scams, ransomware attacks and other external threats. But there’s a foundational risk that quietly underpins many of these issues: poor handling of file uploads and delivery. In 2024, malicious file detections rose 14% over the previous year,…

Cyber Threat to submarine cables in China Sea

For years, global cybersecurity alerts have been issued to safeguard a variety of devices—ranging from personal computers and smartphones to servers and Internet of Things (IoT) devices. Yet, there is a new and unsettling warning gaining traction within tech and…

Clop targets Kellogg and Medusa Ransomware hits NASCAR

Clop Ransomware Targets WK Kellogg Co. in Cyber Attack WK Kellogg Co., now operating as a separate entity from the Kellogg Company, has fallen victim to a cyber-attack, believed to be a ransomware attack. After conducting a technical investigation, the…