Google Workspace Marketplace: 4 Tips for Choosing the Best Apps

Google Workspace Marketplace: 4 Tips for Choosing the Best Apps

An Independent Security Verification badge is one indication that an app should go to the top of your list when evaluating options in the Google Workspace Marketplace. If you’re a Google Workspace administrator or user selecting an application from the Google Workspace Marketplace, your first task is to make sure an application does the job you want completed as easily as possible. Beyond that, you might use the following four indicators from a Google Workspace…

Read More

IT Professionals in ASEAN Confronting Rising Cyber Security Risks

IT Professionals in ASEAN Confronting Rising Cyber Security Risks

In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre of Excellence, in a bid to increase the region’s shared cyber threat defences. The centre is a response to a changing threat landscape. At the opening of the ACICE, Singapore’s Ministry of Defence said Singapore alone experienced a 174% increase in phishing attempts between 2021 and 2022, while Southeast Asia…

Read More

Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs

Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs

Hunters researchers noted the vulnerability could lead to privilege escalation. Google said the report “does not identify an underlying security issue in our products.” Cybersecurity researchers from the firm Hunters discovered a vulnerability in Google Workspace that could allow unwanted access to Workspace APIs. The flaw is significant in that it could let attackers use privilege escalation to gain access that would otherwise only be available to users with Super Admin access. Hunters named this…

Read More

New AI Security Guidelines Published by NCSC, CISA & More International Agencies

New AI Security Guidelines Published by NCSC, CISA & More International Agencies

The U.K.’s National Cyber Security Centre, the U.S.’s Cybersecurity and Infrastructure Security Agency and international agencies from 16 other countries have released new guidelines on the security of artificial intelligence systems. The Guidelines for Secure AI System Development are designed to guide developers in particular through the design, development, deployment and operation of AI systems and ensure that security remains a core component throughout their life cycle. However, other stakeholders in AI projects should find…

Read More

Challenges, Trends and Opportunities for Healthcare Cybersecurity Leaders

Challenges, Trends and Opportunities for Healthcare Cybersecurity Leaders

When managing cybersecurity risk, healthcare has always had higher stakes. When a healthcare organization experiences a cyber attack, it’s about more than just money or reputation – it can be life or death in terms of patient care and treatment.   For this reason, I’m passionate about helping healthcare cybersecurity leaders to address their greatest security challenges and capitalize on emerging trends and opportunities in the security space.   I was thrilled to sit down with the…

Read More

Australian SMBs Feel the Cyber Security Heat: Here’s What IT Pros Can Do to Help

Australian SMBs Feel the Cyber Security Heat: Here’s What IT Pros Can Do to Help

60% of Australian small businesses don’t survive a cyber breach. What can the overworked IT pros in small businesses do with limited budgets against the cyber crime wave? The internet is a difficult space for Australian small and midsize businesses at the moment. Not only does the rate of innovation challenge them to adopt disruptive new technologies with minimal resources, but they also have to contend with the same cyber threats as all other businesses….

Read More

Atomic Stealer Distributes Malware to Macs Through False Browser Downloads

Atomic Stealer Distributes Malware to Macs Through False Browser Downloads

Atomic Stealer malware advertises itself through ClearFake browser updates disguised as Google’s Chrome and Apple’s Safari. Anti-malware software provider Malwarebytes has described a new variant of Atomic Stealer (also known as AMOS), which is malware targeting Apple users. The new malware variant, distributed through the fake browser update delivery mechanism ClearFake, advertises itself as updates for Apple’s Safari browser and Google’s Chrome browser. The malware is capable of grabbing a user’s data and sending it…

Read More

Sekoia: Latest in the Financial Sector Cyber Threat Landscape

Sekoia: Latest in the Financial Sector Cyber Threat Landscape

A new report from French-based cybersecurity company Sekoia describes evolutions in the financial sector threat landscape. The sector is the most impacted by phishing worldwide and is increasingly targeted by QR code phishing. The financial industry also suffers from attacks on the software supply chain and stands among the most targeted sectors impacted by ransomware in 2023. And an increase in attacks on Android smartphones affects the sector, both for cybercrime and cyberespionage operations. Jump…

Read More

Kaspersky’s Advanced Persistent Threats Predictions for 2024

Kaspersky’s Advanced Persistent Threats Predictions for 2024

Kaspersky’s new report provides the company’s view on the advanced persistent threats landscape for 2024. Existing APT techniques will keep being used, and new ones will likely emerge, such as the increase in AI usage, hacktivism and targeting of smart home tech. New botnets and rootkits will also likely appear, and hacker-for-hire services might increase, as will supply chain attacks, which might be provided as a service on cybercriminals’ underground forums. Jump to: More exploitation…

Read More

Cisco’s Journey to DoD 8140 Accreditation 

Cisco’s Journey to DoD 8140 Accreditation 

The CIO for the U.S. Department of Defense (DoD) has recently issued DoD Manual 8140.03 Cyberspace Workforce Qualification & Management Program. This is a role-based approach to identify, develop, and qualify individuals who have federal work roles that align to the DoD Cyber Workforce Framework (DCWF).  The new 8140 mandate will impact a larger number of federal employees and contractors, additionally vendors supporting programs may also need to qualify.       As the world of Cybersecurity…

Read More
1 18 19 20 21 22 27