Firewall hardening – A critical business need

Firewall hardening – A critical business need

Firewall hardening – A critical business need | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Even the most experienced cyber professionals agree: We can’t prevent all breaches

Even the most experienced cyber professionals agree: We can’t prevent all breaches

Even the most experienced cyber professionals agree: We can’t prevent all breaches | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Earth Lusca Employs Sophisticated Infrastructure, Varied Tools and Techniques

Earth Lusca Employs Sophisticated Infrastructure, Varied Tools and Techniques

Since mid-2021, we have been investigating a rather elusive threat actor called Earth Lusca that targets organizations globally via a campaign that uses traditional social engineering techniques such as spear phishing and watering holes. The group’s primary motivation seems to be cyberespionage: the list of its victims includes high value targets such as government and educational institutions, religious movements, pro-democracy and human rights organizations in Hong Kong, Covid-19 research organizations, and the media, among others. However,…

Read More

New cross-sector alliance aims to improve cybersecurity for South Africa

New cross-sector alliance aims to improve cybersecurity for South Africa

Over the last two years, the problem of cybercrime has moved from being a serious but manageable problem to an existential threat with the potential to ruin businesses and destroy lives. There are many reasons for this: the shift to remote work, the mass cloud migration, untraceable cryptocurrencies and sophisticated, well-organised hacking groups have opened up new vulnerabilities and made robust cybersecurity one of the most important aspects of any organization. That growing threat is one…

Read More

Pandemic, zero trust fuel cybersecurity spending growth in Turkey

Pandemic, zero trust fuel cybersecurity spending growth in Turkey

The security burden of moving to remote working during the COVID-19 pandemic, an ever-evolving technology and threat landscape, and a zero trust approach to corporate security will significantly boost overall spending on cybersecurity technology in Turkey over the next several years, according to new research by IDC. Turkey’s security technology market is forecast to grow from $247.43 million in 2020 to $344.89 million in 2025 on the back of strong activity in the top three…

Read More

USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence

USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence

US Cyber Command (USCYBERCOM) has officially linked the Iran-linked MuddyWater APT group to Iran’s Ministry of Intelligence and Security (MOIS). USCYBERCOM has officially linked the Iran-linked MuddyWater APT group (aka SeedWorm and TEMP.Zagros) to Iran’s Ministry of Intelligence and Security (MOIS). The first MuddyWater campaign was observed in late 2017 when targeted entities in the Middle East. The experts called the campaign ‘MuddyWater’ due to the confusion in attributing a wave of attacks that took place between February and October 2017 targeting…

Read More

Can Ransomware Infect Cloud Storage? |

Can Ransomware Infect Cloud Storage? |

January 16th, 2022 No Comments Cloud Security, Ransomware Over the last few years, many businesses and individuals have opted to move their data to cloud storage. Options like Dropbox, Microsoft OneDrive, and SugarSync offer many different benefits compared with storing files locally. These benefits include ease of access, cost-effectiveness, scalability, and security, but is cloud storage really as secure as we like to believe? The latter is a particularly attractive selling point for business owners as it is generally…

Read More

How to Avoid Spam Texts and Protect Personal Information in the Digital Age

How to Avoid Spam Texts and Protect Personal Information in the Digital Age

With Spam Texts on the Rise Consumers Must do their Due Diligence By Reinhard Seidel, Director Products at Clickatell How to Avoid Spam Texts and Protect Personal Information in the Digital Age There have been many advantages to the accelerated digital revolution we are experiencing, but a negative impact is the increased risk for cyber threats. In 2020, spam and phishing text messages were up 146% in the US, subjecting consumers to dangerous cybercriminals attempting…

Read More

What Are DeFi Flash Loans & How To Prevent Flash Loan Attacks?

What Are DeFi Flash Loans & How To Prevent Flash Loan Attacks?

Flash loans, a type of uncollateralized lending, have gained in popularity, as well as bad press. Flash loan attacks are a common threat that enable hackers to steal massive amounts of cryptocurrency reaching up into the hundreds of millions. By: Kiril Ivanov, Founder and Technical Lead, Bright Union What is a flash loan? A flash loan is an ultra-fast, unsecured loan, where the whole lending and returning process occurs within a single transaction on the…

Read More

Why Is It Important to Invest in OT Cybersecurity for 2022?

Why Is It Important to Invest in OT Cybersecurity for 2022?

As we enter 2022, it’s important that organizations invest in cybersecurity for their operational technology (OT) systems. Why? One of the reasons is that Industry 4.0 can sometimes introduce more risk for OT. This is evident in several Industry 4.0 market trends. For example, there’s digital twin infrastructure. That’s where you make a digital copy of your production facility or your machine. You can then simulate the stuff you want to do in the digital…

Read More
1 3,252 3,253 3,254 3,255 3,256 4,005