Home Blog Page 40
Historically identity has been document-centric, requiring the physical presence of a user and a verifiable, government (or other authority)-issued document. However, as transactional interactions have moved online, digital identity has become increasingly critical to business success. The need for...
The Australian government has proposed the Privacy Legislation Amendment (Enhancing Online Privacy and Other Measures) Bill 2021 to safeguard Australians against various data threats online. Attorney-General Michaelia Cash recently released the draft of the proposed Bill, which aims to...
The National Iranian Oil Products Distribution Company (NIOPDC) was out of service for a day due to a cyberattack that affected the entire distribution network. The network, which has been supplying oil products for over 80 years, consists of more...
Cybersecurity experts discover new kinds of cyberattacks more often as threat actors continue to evolve their hacking techniques. Security researchers from A&M University and the University of Florida recently uncovered a new fingerprint capturing and browser spoofing attack that...
It is now well accepted that identity is the new perimeter in this multi-cloud world and is representing the largest security vulnerability for any enterprise. The Verizon Data Breach Investigation Report 2021 establishes that 61% of data breaches involved...
Microsoft has identified the latest activity from Nobelium, the Russian nation-state actor behind the SolarWinds attack in 2020. Nobelium is trying to replicate the same approach and has reportedly targeted hundreds of U.S. organizations in its latest wave of...
With the prevalence of data breaches, the consequences of not securing your databases and network systems could be severe. So, you either boost cybersecurity capabilities or sustain cyber intrusions. Threat actors often target unsecured databases to pilfer sensitive information,...
Failure is not an option. This was NASA’s motto for the Apollo space and moon missions in the last century. It could well be the motto for organizations today, in the context of cyber readiness. We have an experts...
Cyberattacks and malware campaigns against India and its neighboring countries have increased exponentially. Recently, security experts Cisco Talos uncovered a new malware campaign targeting organizations in India and Afghanistan by exploiting a 20-year-old vulnerability in Microsoft Office. Tracked as...
Technology giant Microsoft continues to be the favorite brand of cybercriminals for phishing attacks. According to Check Point’s Brand Phishing Report for Q3 2021, Microsoft has topped “the most commonly imitated brands” list in phishing campaigns. The report highlights...