Two Years for Romance Fraudster Who Targeted Hundreds of Women

Two Years for Romance Fraudster Who Targeted Hundreds of Women

A romance scammer who targeted hundreds of women and persuaded some to give him thousands of pounds has been jailed for over two years. Osagie Aigbonohan, 41, from Lagos, Nigeria, operated under the moniker “Tony Eden” from his flat in Abbey Wood, London. He’s said to have targeted nearly 700 women, including one who was terminally ill and whom he continued to pursue even after she passed away. Police who searched his property also found footwear…

Read More

Microsoft Warns of Destructive Malware Campaign Targeting Ukraine

Microsoft Warns of Destructive Malware Campaign Targeting Ukraine

Microsoft has detected a major malware wiper campaign targeting government, IT and non-profit organizations across Ukraine. Dubbed “WhisperGate,” the attacks were first spotted on January 13, at around the same time that over a dozen government websites were forced offline in what was described as a “massive” cyber-attack. Although Microsoft said it had not noticed any links between the destructive malware campaign, tracked as DEV-0586, and previous known activity groups, it comes at a time of heightened…

Read More

Microsoft Successfully Defended The Azure Cloud From A Massive DDOS Attack. (Spoiler: You Can, Too.)

Microsoft Successfully Defended The Azure Cloud From A Massive DDOS Attack. (Spoiler: You Can, Too.)

How can you fend off the largest DDoS attack in history? For Microsoft, early detection and investing in software as a service was key. Read on to learn more. By Jason Barr, Senior Director of Innovation, Core BTS Last month, European Azure Cloud users faced the largest Distributed Denial-of-Service (DDoS) attack in history. Yet, it was business as usual for Azure Cloud customers — all thanks to Microsoft’s well thought out security protections. For years,…

Read More

Five critical steps to ensure ESM success

Five critical steps to ensure ESM success

Enterprise service management (ESM) takes the principles developed by IT teams in their service management activities and applies them across enterprise business functions. The goal is to improve the quality of service delivered both internally and externally by creating processes and systems that support the organisation’s service delivery goals. In today’s world, companies can no longer be certain about where their customers and employees are and how they interact. The shift from most staff working…

Read More

10 cognitive biases that can derail cybersecurity programs

10 cognitive biases that can derail cybersecurity programs

10 cognitive biases that can derail cybersecurity programs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Firewall hardening – A critical business need

Firewall hardening – A critical business need

Firewall hardening – A critical business need | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Even the most experienced cyber professionals agree: We can’t prevent all breaches

Even the most experienced cyber professionals agree: We can’t prevent all breaches

Even the most experienced cyber professionals agree: We can’t prevent all breaches | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Earth Lusca Employs Sophisticated Infrastructure, Varied Tools and Techniques

Earth Lusca Employs Sophisticated Infrastructure, Varied Tools and Techniques

Since mid-2021, we have been investigating a rather elusive threat actor called Earth Lusca that targets organizations globally via a campaign that uses traditional social engineering techniques such as spear phishing and watering holes. The group’s primary motivation seems to be cyberespionage: the list of its victims includes high value targets such as government and educational institutions, religious movements, pro-democracy and human rights organizations in Hong Kong, Covid-19 research organizations, and the media, among others. However,…

Read More

New cross-sector alliance aims to improve cybersecurity for South Africa

New cross-sector alliance aims to improve cybersecurity for South Africa

Over the last two years, the problem of cybercrime has moved from being a serious but manageable problem to an existential threat with the potential to ruin businesses and destroy lives. There are many reasons for this: the shift to remote work, the mass cloud migration, untraceable cryptocurrencies and sophisticated, well-organised hacking groups have opened up new vulnerabilities and made robust cybersecurity one of the most important aspects of any organization. That growing threat is one…

Read More

Pandemic, zero trust fuel cybersecurity spending growth in Turkey

Pandemic, zero trust fuel cybersecurity spending growth in Turkey

The security burden of moving to remote working during the COVID-19 pandemic, an ever-evolving technology and threat landscape, and a zero trust approach to corporate security will significantly boost overall spending on cybersecurity technology in Turkey over the next several years, according to new research by IDC. Turkey’s security technology market is forecast to grow from $247.43 million in 2020 to $344.89 million in 2025 on the back of strong activity in the top three…

Read More
1 3,362 3,363 3,364 3,365 3,366 4,384