The UK’s GCHQ cyber arm, the National Cyber Security Centre (NCSC), is warning of an imminent surge in AI-based ransomware threats over the next two years. The intelligence and security agency of the United Kingdom emphasizes the critical need for…
Tag: Cybersecurity Insiders
Headlines on Trending Cyber Attacks from Google News
Global Sanctions Imposed on Russian-Linked REVIL Ransomware Operator Governments of Australia, UK, and the United States have jointly sanctioned Alexander Gennadievich, a hacker associated with the Russian-linked REVIL Ransomware group. Gennadievich’s involvement in the Medibank data breach has raised international…
The Insider Threat: Can Employees Pose a Greater Risk than Hackers
In the ever-evolving landscape of cybersecurity, organizations face a multitude of threats that can compromise their sensitive data and operations. While external threats from hackers and cyber criminals are well-recognized, there’s an often-underestimated risk that originates from within – the…
PRODUCT REVIEW: ISC2 CC Certification
In the face of escalating global cyberthreats, the demand for cybersecurity professionals has skyrocketed. Research highlights a need for 3.4 million additional experts in this field. The ISC2 Certified in Cybersecurity (CC) certification, offered by the globally renowned ISC2, is…
France slaps 32 million Euros penalty on Amazon for data privacy concerns among employees
Amazon France Logistique, a subsidiary of the American retail behemoth Amazon Inc., has been hit with a substantial fine of $35 million or €32 million by the Commission Nationale Informatique & Libertes (CNIL), the French data protection authority. The penalty…
OpenAI says NO to election bot as another company suffers backlash from its own AI tool
OpenAI’s ChatGPT, renowned for its conversational capabilities and vast knowledge, has recently taken a proactive stance in light of the upcoming general elections in various nations, including India and the United States. In a move to prevent potential misuse, the…
Hackers spreading ransomware demand a ransom of $50 from patients
In recent times, the landscape of cyber threats has taken a disconcerting turn, deviating from the conventional approach of hackers encrypting computers for ransom. The latest trend involves cyber attackers directly reaching out to impact patients, demanding a ransom ranging…
Ransomware and Cyber Attack related news headlines trending on Google
Microsoft revealed on Friday that its corporate email servers were breached by the hacking group Midnight Blizzard, which is believed to be funded by the Russian-sponsored online crime group Nobelium. The cyberattack, which occurred on January 12th, targeted customer data…
How many types of Network Security protocols exist
Network Security protocols are designed to safeguard computer networks from unauthorized access, data breaches, and other cyber threats. And here are some common types of network security protocols: Secure Sockets Layer (SSL) / Transport Layer Security (TLS): SSL and its…
Cloud Security Is Best Achieved With The Right Preparation
The Importance Of Cloud Security Cloud migration is one of the hottest industry topics right now. Many organizations are rapidly making the transformation to the cloud, and industry professionals are rapidly working to hone their cloud skills. Within all cloud…