Home Search

NCSC - search results

If you're not happy with the results, please do another search
Log4j, Iranian Ransomware Actors, SpoofedSccholars, second-tier targets, NIOPDC

Microsoft Identifies Six Iranian State Actor Groups Deploying Ransomware

It’s not just stealing confidential data. Cybercriminal activities from state-sponsored actors have evolved, targeting critical infrastructures and demanding ransom from high-net-worth companies. Various threat...
Avaddon ransomware, Microsoft and Fortinet flaws, apt

CISA, NCSA, ACSC Warn of Iranian APT Actors Exploiting Microsoft and Fortinet Flaws

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), and the United Kingdom’s National...
Labour Party

Britain’s Labour Party Suffers Cyber Incident

Cyberattacks and data breaches via third-party vendors continue to become prevalent, affecting organizations’ critical data. Britain’s Labour Party recently announced that it had sustained...
ethical hacking

How to Build a Career in Ethical Hacking in 2021 and Beyond

Ethical hacking is emerging as a viable career path for IT and security professionals in 2021. The alarming rate of cyber incidents has pushed...
superhero passwords

Superhero Passwords Become Kryptonite: Mozilla Warns

The significance of keeping strong passwords while talking about data privacy and security cannot be ignored. Despite several awareness campaigns, many people still reuse...
learn ethical hacking

How to Learn Ethical Hacking from Scratch and Start Your Career

As businesses and government organizations face increasing risks of cyber threats in the digitalization era, the interest to learn ethical hacking programs has increased. The demand for these...
security, teams, skills

Why Skills Gap is an Opportunity for a New Approach to Building Strong Cybersecurity...

The cybersecurity skills gap could hardly have come at a worse time. According to a study by the Centre for Strategic and International Studies...
Vulnerabilities in Zimbra

CISA Provides Details on Top Routinely Exploited Vulnerabilities in 2020 and 2021

Organizations can boost their overall cybersecurity posture by regularly updating their network systems and patch vulnerabilities. Understanding how attackers leverage malicious techniques and the...
World Password Day 2021

Fine-tune Your Passwords this World Password Day 2021

Passwords – the most common and effective authentication method to securely log in systems and keep data secure – have now become a potential...
ransomware, fonix, fonix ransomware, Cybereason Partners with Intel for Hardware-Enabled Ransomware Prevention, Kronos

Ransomware Task Force Issues Framework to Combat Ransomware Attacks

Combating rising ransomware attacks has become a challenge for organizations globally. Several ransomware groups are targeting companies by encrypting their systems, paralyzing operations, and...

MOST POPULAR

RECENT POSTS