Tag: Cybersecurity Insiders

Insider Threat fetches $400m loss to Coinbase

Coinbase, one of the leading cryptocurrency exchanges in the United States, has been the target of a significant cyber attack, potentially leading to losses ranging from $180 million to $400 million in the current financial year. This forecast comes from…

AI Is Already in Your Org—Are You Securing It All?

It’s been impossible to avoid the buzz around generative AI, especially since ChatGPT took the world by storm. And while tools like DeepSeek, Mistral, and LLaMA are reshaping the open-source frontier, one thing is certain: generative AI is here to…

INE Security Alert: Top 5 Takeaways from RSAC 2025

Cary, North Carolina, 13th May 2025, CyberNewsWire The post INE Security Alert: Top 5 Takeaways from RSAC 2025 first appeared on Cybersecurity Insiders. The post INE Security Alert: Top 5 Takeaways from RSAC 2025 appeared first on Cybersecurity Insiders. This…

Malware emerging from AI Video generation tools

AI-generated video content is gaining popularity, particularly among younger audiences. However, this growing trend has also caught the attention of cybercriminals, who are now leveraging these platforms to distribute malicious software. One such threat that has recently emerged is the…

Why Traditional Vulnerability Management Fails in the Cloud

Traditional vulnerability and application security tools are failing in cloud-native environments. It’s not that these tools aren’t good at what they do. The fact is, they weren’t designed for the particular challenges presented by dynamic cloud environments. These tools rely…

The CVE Crisis: Why Reactive Patching is Obsolete

The rapid escalation of Common Vulnerabilities and Exposures (CVEs) has become a critical concern for security teams. Five years ago, approximately 50 new CVEs were identified daily. Today, that number has surged to roughly 140. This unabated increase in vulnerabilities…

What should we learn from International Anti Ransomware Day

International Anti-Ransomware Day is observed annually on May 12th, following its official declaration by INTERPOL in 2022. The day serves as a crucial reminder for businesses to maintain updated data backups and have a disaster recovery plan in place—measures that…

No cyber threat to India ATMs from Pakistan Ransomware Attack

In recent days, relations between nuclear-armed neighbors India and Pakistan have become increasingly tense following a terrorist attack in Pahalgam, Jammu and Kashmir. The Indian government, under the leadership of Prime Minister Narendra Modi, launched “Operation Sindoor” earlier this week…

The Rising Sophistication of Social Media Spoofing

Social media platforms have become essential to our everyday communication for both personal use and professional business operations. Platforms such as LinkedIn, Instagram, and Facebook are widely used by organizations for marketing objectives, helping communicate brand messaging and attracting potential…

Still Running Windows 10? Cybercriminals Thank You.

When Windows 10 support ends on October 14, 2025, unpatched vulnerabilities will become permanent entry points for cybercriminals. After Windows 7 lost support, malware infections surged by 125%—Windows 10 users can expect a similar wave of attacks. In 2023, the…

Ransomware news headlines trending on Google

LockBit Ransomware Gang Becomes Victim of Data Breach The infamous LockBit ransomware group, known for its double extortion tactics and involvement in high-profile cybercriminal activities, has itself fallen victim to a significant data breach. The attack has resulted in the…

CISO Global Shifts to SaaS Cybersecurity Platform

Leading cybersecurity provider CISO Global (NASDAQ: CISO) is entering a new phase of growth, pivoting toward high-margin, recurring-revenue software offerings that complement its managed and professional services. According to a recent Zacks report, the company has launched multiple proprietary software…

Top 10 Cloud Security Mitigation Tactics

As businesses continue to migrate operations and data to the cloud, securing cloud environments has become more critical than ever. Cloud security threats are dynamic and complex, making proactive mitigation tactics essential to protect sensitive data, ensure compliance, and maintain…

The distinction between Data Privacy and Data Security

In today’s digital age, where vast amounts of personal and business information are shared and stored online, two terms often come up: data privacy and data security. While they are closely related and essential for protecting sensitive information, they refer…

AI vs. the Human Mind: The New Ransomware Playbook

Ransomware has always relied on the psychological levers of fear, urgency, and shame to pressure victims. But the rules of engagement are changing.  Cybercriminals are leveraging AI to ratchet up the pressure with more convincing, manipulative techniques, using everything from…

Strengthening Cybersecurity in the Vulnerable Educational System

School systems may not immediately come to mind as targets for cybersecurity attacks. However, threat actors have increasingly turned their attention to them, recognizing that the extensive digital infrastructure supporting schools contains a wealth of sensitive information that can be…

Stealth Tunnels: The Dawn of Undetectable Remote Access

In today’s world, more employees work from home, coffee shops, or satellite offices than ever before. While remote access tools like VPNs have kept us connected, they’re increasingly easy for network gatekeepers to spot—and sometimes block or slow down. Enter…

Why Modern Businesses Need Cyber Threat Intelligence

Every seasoned professional knows that effective cybersecurity rests on knowledge. You cannot counter attacks unless you know how they work and what they target. That’s why enterprises rely on cyber threat intelligence that delivers essential insights to power their security…

New Cyber threats emerge from Cyber Attacks on UK Companies

Over the past two weeks, media outlets have been rife with speculations about a significant cyber attack affecting three major UK-based companies: Marks & Spencer, Harrods, and Co-Op. Reports suggest that cybercriminals infiltrated these organizations, resulting in severe data breaches…

Crypto Agility: Preparing for the Post-Quantum Shift

Many enterprises believe their encryption is secure—until a new threat proves otherwise. Quantum computing and evolving cryptographic risks are forcing security teams to rethink their defenses before it’s too late. Cybercriminals are already harvesting encrypted data, storing it for future…

Cyber Attack on British Co-Operative Group

The Co-Operative Group, commonly known as Co-Op, has issued an official statement confirming that some of its systems were recently targeted in a cyber attack. The retailer, which operates in a variety of sectors including food retail, funeral services, and…

Akira Ransomware attack on Hitachi Vantara Servers

Hitachi Vantara, the global technology powerhouse and a subsidiary of Japan-based Hitachi, was targeted by the notorious Akira Ransomware gang last weekend, forcing the company to take drastic measures. In a bid to contain the spread of the malware, Hitachi…

What is Slopsquatting and is it a New Emerging Cyber Threat?

In the ever-evolving landscape of cybersecurity, new types of threats are constantly emerging. One relatively new tactic that has been gaining attention is slopsquatting, a technique that cybercriminals use to exploit common human errors and vulnerabilities in domain names. But…

Essential Cloud Security Practices Every User Must Follow

As businesses and individuals increasingly rely on cloud services for storage, collaboration, and computing power, the importance of securing cloud environments has never been more critical. Cloud computing offers numerous advantages, including scalability, accessibility, and cost-efficiency. However, with these benefits…

Enhancing Blue Team Defense: The Power of AI

AI is transforming cybersecurity on both sides of the battle. As threat actors use AI to enhance and amplify their attacks, the Blue Teams responsible for identifying security threats in the operating environment are exploring how to leverage large language…

FBI confirms $16.6 billion losses to cyber-crime in 2024

The FBI (Federal Bureau of Investigation), the United States’ premier law enforcement agency, has recently published its Internet Crime Report for 2024, revealing a staggering loss of approximately $16.6 billion from cybercrimes. These figures reflect the volume of complaints reported…

Cyber insurance providers: Friends not foes

The relationship between an insurance provider and the insured is often described as adversarial: one party reluctantly pays a premium, while the other is reluctant to pay out if possible. But cyber insurance doesn’t have to be this way. The…

Cybersecurity Blogs: What You Should Know in 2025

There are many blogs about cybersecurity. Some blogs are for people who are not experts. They help you learn how to stay safe online. Other blogs are for professionals who work in cybersecurity. These blogs talk about deep topics like…

Saudi Cyber Innovation: Redefining SOC Operations

Launch of COGNNA at RSA 2025 Security teams today face an unstoppable challenge—one that isn’t just about technology but about operational endurance. For years, SOC analysts have been inundated with alerts, struggling with fragmented tools and siloed systems that require…

Mark & Spencer hit by Cyber Attack on Easter

On April 21, 2025, British retail giant Mark and Spencer (M&S) confirmed that it was the victim of a cyberattack that disrupted its contactless payment terminals in over 1,400 of its UK stores. The company reassured customers that both its…

New cryptocurrency creation will lead to more ransomware attacks

In the past two to three years, law enforcement agencies around the world have made significant strides in combating ransomware attacks. These malicious attacks, often involving file-encrypting malware, have wreaked havoc on individuals, businesses, and even entire governments.  However, authorities…

Akira Ransomware shifts focus to SMBs

Many small and medium-sized businesses (SMBs) operate under the assumption that cybercriminals won’t target them, believing their data or systems lack the value to entice hackers. After all, these businesses often can’t afford the hefty ransoms that typically interest cyber…

Emerging cyber threats from Genetic Data

In today’s digital age, cyberattacks are becoming increasingly sophisticated, with hackers targeting not only financial information or personal identities but also more intimate and sensitive data—genetic data. While we have long been aware of the risks to personal information like…

Chinese smartphones now stealing cryptocurrency from wallets

The next time you’re looking for a budget-friendly smartphone, particularly one from a Chinese brand, you might want to proceed with caution. A recent warning from cybersecurity experts at Dr. Web, an anti-virus software company, suggests that purchasing low-cost smartphones…

When Security Gets Too Complicated: A Return to Basics

In the cybersecurity industry, we’ve become obsessed with complexity. Every conference showcase features dazzling new AI-infused solutions, quantum-resistant algorithms, and blockchain-secured systems promising to revolutionize our defenses. Vendors pitch increasingly sophisticated tools with astronomical price tags, and leadership teams eagerly…

Cybersecurity Talent Gap

I love my job This isn’t said sarcastically or trying to convince myself. I genuinely love my job. I love my company and coworkers and the ability to help clients. I think I have the best job out there and…

Breaking the Cycle: Prioritizing Recovery Over Ransom Payments

In 2024, businesses paid $813 million to cyber criminals as the result of ransomware. That’s an astronomical sum, highlighting the immense financial burden cybercrime places on organizations. Rhode Island’s cyberattack of December 2024, where state officials paid out a $5…

Security Gaps Widen: A Perfect Storm for Insider Threats

High-profile cyberattacks involving ransomware, malware, zero-day exploits, and nation-state intrusions dominate headlines. These attacks are bold, disruptive, and external, commanding attention from security teams to detect and stop these threats. Amid the noise, a quieter danger is gaining momentum from…

United Health offers Ransomware Loans

Ransomware attacks have become a significant threat to businesses, often leaving them financially devastated and struggling to stay afloat. Many affected companies find it nearly impossible to recover, eventually teetering on the edge of closure due to the financial burden…