Cybersecurity solutions provider F-Secure published a report detailing how attackers look for backdoors via counterfeit devices. In its investigation report, F-Secure stated that it discovered a pair of counterfeit network switches impersonating the Cisco network switches. The counterfeit devices...
COVID-19 has not only impacted global physical health, but also cyber health. The constant fixation on the Internet is indicative of the stalking behavior, and how perpetrators are using malicious online tactics to harass their targets. Digital security solutions...
With the exponential increase in the social media footprint on the internet, anti-social elements are finding newer ways of spreading fake news by exploiting social media platforms, manipulating algorithms and search engines with malicious intentions. The latest example on...
A research from Merritt Group stated that most CISOs value advice from their peers more than any source when shopping for cybersecurity vendor solutions.
The research report “Marketing & Selling To The CISO” revealed that 64% of CISOs admitted that...
An Argentine telecommunication services provider, Telecom Argentina, reportedly fell prey to a ransomware attack on July 18, 2020. The effects of the attack were first noticed when the Telecom’s employees started facing issues and lag in their systems while...
Security research firm Canalys reported that cybersecurity spending will remain as an essential expenditure for most organizations in 2020 as cyberthreats and vulnerabilities continue to affect the industry. In its analysis report “Global Cybersecurity 2020 Forecast,” Canalys revealed that...
A security investigation from cybersecurity firm WizCase discovered a misconfigured Amazon S3 server that exposed data of Mexican football site, Fut Fantastico. The data breach exposed personally identifiable information (PII) of 150,000 active and inactive users, including the full...
There are glaring holes in how enterprises currently tackle security analytics, and by redefining the approach, the analyst’s role can be transformed. Rani Hmayssi, Regional Manager Google Cloud Middle East explains how.
What are the top challenges organizations face to...
Security researchers from WizCase discovered unprotected databases belonging to multiple e-learning platforms that were exposed online without password protection. The unencrypted databases leaked personally identifiable information (PII ) such as names, emails, passwords, ID numbers, contact numbers, addresses, birth...
A proposal from the U.K. government stated that insecure IoT devices that are used in households and businesses could be banned from sale or removed from the market if they fail to meet the basic security standards. The new...














