Strong login credentials are treated as the first defense against unauthorized intrusions. However, they also become a gateway for cybercriminals to penetrate critical network systems. Threat actors mostly obtain sensitive login information like usernames, passwords, or passcodes via data...
We cannot ignore the significance of strong passwords while talking about cybersecurity. Most internet users still use easy-to-guess credentials or reuse passwords, making a hacker’s jobs easy. Adversaries often steal credentials or crack passwords to break into users’ online...
Apple has sued Israel-based NSO Group for state-sponsored surveillance, and now Israel has limited the number of countries that can buy the hacking and surveillance tools from the region.
According to reports, Israel has come down stringently on the local...
Sensitive data is a goldmine for adversaries. Recently, the Italian Antitrust Authority fined Google Ireland Ltd. and Apple Distribution International Ltd. €10 million ($11.26 million) each, citing aggressive data practices. The agency stated that both companies had violated the...
Group-IB, one of the global cybersecurity leaders, will stream its annual signature event CyberCrimeCon on December 2, 2021. The 10th edition of CyberCrimeCon, a global threat hunting and intelligence conference, will assemble more than 5,000 cybersecurity pros from around...
Blockchain technology has sparked interest across all industry types due to its prime feature of data immutability and distributed consensus helping to secure and validate data across the internet. Organizations aspire to boost their business with the help of...
Cloud misconfigurations become one of the major reasons for unauthorized intrusions and accidental data breaches. Threat actors often target unsecured or poorly configured cloud infrastructures to compromise and steal classified information. Recently, security experts from Palo Alto Network's Unit...
Disruption in the way we work has exploded in intensity and breadth since the onset of 2020. As India starts to see some semblance of normality, businesses need to think about what the future of work looks like and...
The U.K. government has introduced the Product Security and Telecommunications Infrastructure (PSTI) Bill in Parliament to strengthen consumers’ Internet of Things (IoT) against rising hacker intrusions. The new legislation requires IoT manufacturers, importers, and distributors to meet certain cybersecurity standards....
Last year around December, there were many ransomware attacks on U.S. health care institutions. And in May this year, the Conti ransomware gang targeted the Irish health care system. With the holiday season round the corner, we anticipate more...














