Home Blog Page 41
Data Security Council of India (DSCI) has launched a whitepaper on encryption titled “Encryption and the Digital Economy: Balancing Security, Privacy and National Security”. The paper offers a holistic viewpoint on the more extensive encryption debate by engaging with...
The cybersecurity industry is a booming sector that promises technology growth and multiple career opportunities. This industry has proven its ability to grow even in challenging times of the global pandemic was contrary to other sectors that had shown...
Cyber-protected storage has been gaining more attention with all the news around data storage hacks, ransomware attacks, and immutable storage erased in the banking and financial services sector. In the security architecture, the storage and backup environment act as...
Security researchers from Safety Detectives discovered an unsecured ElasticSearch server containing scraped social media profiles taken from Instagram and TikTok. The leaky database, which belonged to the social media analytics site IGBlade.com, reportedly exposed more than 2.6 million records of...
Researchers at Recorded Future’s Gemini Advisory unit released an advisory revealing the hacking group FIN7’s malicious operations under the guise of a cybersecurity services firm Bastion Secure. Through this phony company, the group is recruiting IT specialists, to conduct...
Russian state-sponsored threat actor groups are known for innovative attack techniques and malware campaigns, ruling the underground darknet markets with various cybercriminal activities. Russian attackers have extended their targets from small organizations to critical infrastructures across the globe. Surprisingly,...
Business cyber resilience programs fail when organizations are attacked, and there are certain reasons for this. Vanessa Vaughn Mathews, founder and Chief Resilience Officer of Asfalis Advisors works with many organizations across different sectors. She has also worked closely...
The comprehensive overview of the present cyberthreat landscape has changed drastically, with threat actors leveraging new hacking techniques more often. Besides, the pandemic gave additional opportunities to hackers in targeting users with various COVID-19 themed attacks. The global crisis...
The Commerce Department's Bureau of Industry and Security (BIS) in the U.S. announced new policies to control the export of cybersecurity items to regions with despotic practices. Russia and China are the more popular names that are associated with...
The demand for trading sensitive stolen data and other malicious activities has reached new highs across underground dark web marketplaces. The global pandemic and related trends fortified various cybercriminals groups to extend their criminal activities. Today, threat actors trade from...