Home Blog Page 19
In 2022, Cybercriminals will leverage the combination of IoT and 5G to conduct large-scale attacks, and attributing these attacks may become much more challenging. Given the speed and capacity available through 5G, hackers will hitch this to their tradecraft...
Cyberattacks and data breaches can be devastating to an organization's growth. Fuelled by the COVID-19 pandemic, enterprises worldwide sustained significant losses due to cyberattacks, especially ransomware. Apart from information theft, cyberattacks could cause a range of problems to victim...
Accellion, a provider of hosted file transfer services, recently agreed to pay $8.1 million to settle a class-action lawsuit related to a data breach in December 2020. The lawsuit, filed in a California Federal Court, claims that Accellion failed...
Among my three cybersecurity predictions for 2022, the one that I am optimistic about is cybersecurity getting more mindshare in the boardroom.  Expect to see cybersecurity-focused board members taking an active role in understanding the organization's cybersecurity posture, including...
Platforms based on blockchain technology are currently garnering much public interest worldwide since they have always been an entry point for billions of individuals to build social communications. LeewayHertz says by 2025, social media is expected to rise at a CAGR...
The perimeter disappeared when remote working came along, and all the security mechanisms for protecting information assets behind a firewall, were no longer adequate. The attack surface has broadened to include home networks, and the attack vectors are directed...
Microsoft’s security experts identified a novel malware campaign targeting several IT, non-profit, and government organizations based in Ukraine. Tracked as WhisperGate, the activities of the destructive malware campaign were first spotted on January 13.  As per a report from...
Several organizations started the New Year globally with hacker intrusions and data breaches, but few cybercriminal groups benefitted from their malicious activities. A recent analysis from blockchain firm Chainalysis revealed that North Korean threat actors stole over $400 million...
IT experts rise to the rank of chief information security officer (CISO) because they have mastered the science and engineering involved in that discipline. But for a CISO to thrive, leadership skills are critical. And leadership is an art. By...
Ransomware in a triad is the title of a recent cybersecurity article that caught my attention. The same repetitiveness can be found in aviation and dates back to poor radio communications where it was necessary to repeat a message....