On January 16th, President Joe Biden signed a comprehensive executive order to strengthen U.S. cybersecurity. The order mandates secure development practices for federal software vendors, launches an AI program within the Pentagon to enhance cyber defense with a pilot in…
Tag: Cybersecurity Insiders
Quorum Cyber Continues Expansion in North America with Kivu Consulting Acquisition
Quorum Cyber Expands Its Incident Response Capabilities By Adding Digital Forensics, Business Restoration, and Ransom Negotiations To Its Service Catalogue Edinburgh, UK and Berkeley, California, US – January 9, 2025 – Quorum Cyber – headquartered in the U.K., with offices…
The Bouncer at the Door: Protecting Your Network from Within
Imagine for a few minutes that you are the owner of an exclusive club where business VIPs gather to share information and relax. And then assume that you hired the best security detail – a “Bouncer” – to stand at…
Microsoft exposes WhatsApp Spear Phishing Campaign of Star Blizzard
Microsoft’s Threat Intelligence teams have uncovered and exposed a spear phishing campaign targeting WhatsApp accounts, attributed to the Russian-linked hacker group Star Blizzard. The campaign began in October 2023 and continued through August 2024. Following extensive analysis, Microsoft’s experts revealed…
State of Network Threat Detection 2024 Report
Executive Summary While “platformization” has been a hot topic in 2024, it has also been a year in which security professionals have looked to advanced, highly specialized tools to help them solve thorny problems that not only persist but seem…
NSA issues warning to iPhone users on data security
National Security Agency (NSA) of the United States has issued a global advisory for iPhone users regarding a device setting that raises significant data security concerns. According to the agency, this setting could enable third-party applications and hackers to conduct…
How Video-Based Training Drives Compliance in Cybersecurity Policies
Cybersecurity threats are becoming more sophisticated, posing significant risks to organizations of all sizes. With sensitive data and critical systems at stake, employee compliance with cybersecurity policies is crucial to mitigating these threats. One effective way to ensure compliance is…
GoDaddy falls into FTC Data Breach radar
GoDaddy, a prominent web hosting service provider trusted by millions of customers to host their websites, has long been recognized as a digital enabler for small businesses. However, recent security lapses have tarnished its reputation, drawing the attention of the…
North Korea targeting software developers with Malware
Lazarus Group, a notorious hacking collective believed to be funded by North Korea’s government, is now shifting its focus to target software developers and freelancers through malware campaigns. Their strategy is straightforward: they aim to deceive victims and infiltrate their…
FunkSec Ransomware created using Artificial Intelligence
Ransomware attacks have dominated headlines for quite some time, with various hacking groups targeting both public and private organizations. Law enforcement agencies have also been actively engaged in covert operations to apprehend those behind these malicious campaigns. However, the latest…