Home Blog Page 226
Security services provider Deepwatch announced a partnership with cybersecurity management consultancy firm Tevora to extend its ability to offer advanced managed security services to customers. With the new partnership, the customers of both companies will benefit from the addition...
Kerala, one of the worst-hit states in India’s COVID-19 crisis, reported five positive cases from Aythala in Ranni-Pazhavangady panchayat. The database of all the active patients, and those who came in direct contact with them, was maintained on the...
With an increase in the number of cyberattacks, cybersecurity has emerged as a primary investment priority for organizations in the U.K. Businesses there have increased their budget allocation to enhance their cybersecurity capabilities. This resulted in U.K. firms becoming...
Amidst the rising concerns over COVID-19 spread and the amount of distress it is causing to the Healthcare industry, certain hacking groups have had a heart and decided against launching cyberattacks targeted at critical healthcare infrastructures. However, there are...
A research report from Egress, a provider of human layer security solutions, revealed that 96% of security leaders opined insider data breaches as a major concern. The report named as “Insider Data Breach Survey” uncovered that 77% of employees...
A threat intelligence group from Kaspersky discovered a hacking campaign, distributing a malicious Trojan tracked as Milum, which is targeting industrial organizations in the Middle East. The research team described the hacking activity as APT (advanced persistent threat), which...
A hacker group targeted the World Health Organization (WHO) via a sophisticated phishing attack, which involved an email hosted on a phishing domain that tried to trick the employees into entering their credentials, Reuters reported. It’s said that the WHO...
The outbreak of the novel Coronavirus (COVID-19) is giving rise to threats related to cybersecurity and data privacy. One such threat, according to Kaspersky researchers, is the Ginp Banking Trojan, which takes advantage of Android users. The infamous Trojan...
Hackers have now set their sights on the global workforce working from home. Taking advantage of the COVID-19 pandemic, there has been an increase in Phishing scams using COVID-19-themed text messages. Here are some ways to identify a phishing email...
The answer depends on which era did you ask this question. From the 90s to the noughties the answer was “Network” since every critical asset--servers, applications, users and devices--were safely ensconced within your perimeter defense. With the advent of...