Home Blog Page 172
The COVID-19 pandemic took many businesses by surprise. Companies that were vehemently opposed to remote work because of security and compliance concerns have found themselves forced to reconsider their stance at an alarmingly quick rate. This means that remote...
Group-IB researchers have detected attacks on multiple companies across the globe that are carried out by Iranian newbie threat actors for financial gain. These attacks have been actively orchestrated since at least June 2020. The threat actors are using...
Apple is known for its tight security measures to prevent malicious software from landing in its app store. However, security researchers found that Apple's macOS app notarization process inadvertently approved a malware disguised as an Adobe Flash installer. What is...
Business Email Compromise (BEC) attacks have become a highly remunerative line of business for threat actors. A new research from the APWG (Anti-Phishing Working Group) revealed how enterprises lose their wealth to BEC attacks. In its “Phishing Activity Trends...
Facebook filed two separate lawsuits in the U.S. and the U.K. against app developers for exploiting its platform and harvesting users’ data illegally. According to a report, Facebook Inc. and Facebook Ireland charged MobiBurn, OakSmart Technologies and its founder...
We, cybersecurity professionals, have been hiding behind lies for a few years now. "Cybersecurity is a new industry. There is not enough data to measure maturity" "Maturity models work where there are well-defined processes to follow. Like software development. Not cybersecurity....
According to a latest survey from security firm Privitar, nearly 78% of consumers globally are concerned or very concerned on personal data protection and more than 50% of them still wary of sharing their personal data with companies. In...
Security researchers from CyberNews warned that cybercriminals could take advantage of unsecured internet-connected printers to control corporate networks and access sensitive information like device names, locations, device models, firmware versions, IPP (Internet Printing Protocol) port, and Wi-Fi SSIDs. In...
Cyber intelligence firm Cyble claimed that a threat actor group “John Wick” demanded ransom after gaining unrestricted access to a database belonging to Paytm Mall, an e-commerce unit of payment solutions provider Paytm. Cyble stated that the group uploaded...
Data security has become the talk of the town and is being discussed over a cup of coffee to a beer in hand, and from board rooms to pool tables. Even world-renowned leaders and dignitaries like the Democratic nominee...