Building cyber security careers – IT Governance UK Blog

Building cyber security careers – IT Governance UK Blog

The need for experienced and qualified cyber security professionals is a highlight of Cybersecurity Career Awareness Week, led by NICE (National Initiative for Cybersecurity Education). This campaign is part of Cybersecurity Awareness Month 2021, which is focused on empowering individuals and organisations to “own their role in protecting their part of cyberspace”. UK skills gap The UK government’s Cyber security skills in the UK labour market 2021 report estimates that approximately 680,000 UK businesses (50%…

Read More

Threat Actors Abusing Discord to Spread Malware

Threat Actors Abusing Discord to Spread Malware

Researchers have discovered new multi-function malware abusing the core functions of popular group app platform Discord. Check Point explained in a blog post this morning that it found several malicious GitHub repositories featuring malware based on the Discord API and malicious bots. It included various features, including keylogging, taking screenshots and executing files. Discord bots help users automate tasks on the Discord server. However, they can also be used for malicious ends, the researchers warned….

Read More

US to Ban Export of Hacking Tools to Authoritarian States

US to Ban Export of Hacking Tools to Authoritarian States

The US government has issued new rules designed to prevent the export of hacking and surveillance tools to regimes guilty of human rights abuses. The “interim final rule” was released by the Commerce Department’s Bureau of Industry and Security (BIS) and will go into force in 90 days, Governments singled out by the proposals are “of concern for national security reasons” or subject to an arms embargo. Restrictions will also apply if the exporter knows that the…

Read More

Data Scrapers Expose 2.6 Million Instagram and TikTok Users

Data Scrapers Expose 2.6 Million Instagram and TikTok Users

Security researchers have discovered over two million social media user profiles scraped from the internet after they were unwittingly exposed online by an analytics firm, Infosecurity can reveal. A team at reviews site SafetyDetectives led by Anurag Sen found the data located on a misconfigured Elasticsearch server, left exposed without any password protection or encryption in place. It quickly traced the 3.6GB trove of more than 2.6 million TikTok and Instagram profiles to IGBlade, a firm that provides marketing insights…

Read More

Professional diversity within security

Professional diversity within security

Professional diversity within security This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message or continuing…

Read More

Does your communication platform guarantee data security – and data privacy?

Does your communication platform guarantee data security –  and data privacy?

Does your communication platform guarantee data security – and data privacy? This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

CIS Control 09: Email and Web Browser Protections | The State of Security

CIS Control 09: Email and Web Browser Protections | The State of Security

Web browsers and email clients are used to interact with external and internal assets. Both applications can be used as a point of entry within an organization. Users of these applications can be manipulated using social engineering attacks. A successful social engineering attack needs to convince users to interact with malicious content. A successful attack could give an attacker an entry point within an organization. CIS Control 9 provides several safeguards to ensure safety of…

Read More

Critical National Infrastructure (CNI) Attacks on the Rise: Are We Ready?

Critical National Infrastructure (CNI) Attacks on the Rise: Are We Ready?

When we think about cyberattacks and malicious hackers, we often think in terms of our own personal lives and our own organizations. In my experience in cybersecurity, I often hear people say “Why would hackers target me? We are too small” or “I’ve never been affected by a cyberattack, so it’s not really something I’m interested in.” The reality is that cybercriminals may be targeting you not because of your size but because of who…

Read More
1 2,195 2,196 2,197 2,198 2,199 2,758