Top eight cybersecurity predictions for 2022

Top eight cybersecurity predictions for 2022

Top eight cybersecurity predictions for 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Utility Cybersecurity: How Cyber Awareness Can Reduce Future Risk

Utility Cybersecurity: How Cyber Awareness Can Reduce Future Risk

Utility Cybersecurity: How Cyber Awareness Can Reduce Future Risk Compliance & Risks Trend Micro has released a technical report on how the electric utility industry can gain situational awareness across entire network. By: Kazuhisa Tagaya March 14, 2022 Read time:  ( words) The electric utility industry is one of the most critical infrastructure industries that highly affect people’s lives and economic activities. The power grids connect the systems of power generation, substation, transmission, and distribution…

Read More

Cybersecurity report identifies top 5 cybercrime rings

Cybersecurity report identifies top 5 cybercrime rings

Cybersecurity report identifies top 5 cybercrime rings | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

New Nokoyawa Ransomware Possibly Related to Hive

New Nokoyawa Ransomware Possibly Related to Hive

Hive, which is one of the more notable ransomware families of 2021, made waves in the latter half of the year after breaching over 300 organizations in just four months — allowing the group to earn what could potentially be millions of US dollars in profit. In March 2022, we came across evidence that another, relatively unknown, ransomware known as Nokoyawa is likely connected with Hive, as the two families share some striking similarities in…

Read More

Nonprofit Cyber launches with mission to increase cybersecurity awareness

Nonprofit Cyber launches with mission to increase cybersecurity awareness

Nonprofit Cyber launches with mission to increase cybersecurity awareness | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Cybercrime: A clear and present danger

Cybercrime: A clear and present danger

Cybercrime: A clear and present danger | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Cyberattacks are Prominent in the Russia-Ukraine Conflict

Cyberattacks are Prominent in the Russia-Ukraine Conflict

The Conti intrusion set, which Trend Micro tracks under the moniker Water Goblin, has remained active despite other well-established ransomware groups shutting down in the wake of government sanctions. We also observed a spike in the volume of activity for the BazarLoader malware — a key enabler for Conti attacks — since early February 2022.  Conti chat logs leaked  Meanwhile, external sources have reported on the chats of Conti operators being leaked by a Ukrainian…

Read More

Wiperware (pseudo ransomware) used in Ukraine cyberattacks

Wiperware (pseudo ransomware) used in Ukraine cyberattacks

Wiperware (pseudo ransomware) used in Ukraine cyberattacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

4 critical security strategies to prevent cyberattacks in 2022

4 critical security strategies to prevent cyberattacks in 2022

4 critical security strategies to prevent cyberattacks in 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

This Week in Security News – February 25, 2022

This Week in Security News – February 25, 2022

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn about how to protect your organization from cyberattacks targeting open-source servers. Also, read about the most recent cyberattack warnings following Biden’s sanctions on Russia. Read on:  Recent Cyberattacks Increasingly Target Open-source Web Servers As organizations reeled from the Log4Shell vulnerability (CVE-2021-44228), cyberattacks aiming at open-source web servers, like…

Read More
1 26 27 28 29 30 43