With rising state-sponsored ransomware operators and attacks becoming widespread, the Australian government has announced a Ransomware Action Plan to tackle the rising cyberthreats. The government is also collaborating with international and business partners to protect Australians against global ransomware...
Over the past few weeks, several cases of lost crypto wallets have been reported and tweeted on social media platforms. Users have been complaining about zero balance in their crypto wallets; a result of accepting a gift on the...
As announced earlier, the Biden administration has initiated the virtual Counter-Ransomware Initiative meetings joined by ministers and senior officials from over 30 countries to address the growing ransomware landscape. The two-day Counter-Ransomware Initiative meetings will discuss the efforts to improve...
Ransomware has become synonymous with cyberattacks in the last two years and is single-handedly driving conversations and investments in the cybersecurity domain. Organizations that weren’t taking cybersecurity seriously, now have their boards talking about ransomware threats and asking about...
Indian organizations have become a primary target of various cyberattacks. Several state-sponsored malware campaigns are making rounds to compromise critical infrastructures across multiple sectors in the country. As the government of India focuses on acquiring advanced technologies to defend...
Apple has released a security update iOS 15.0.2 and iPad OS 15.0.2 to fix a zero-day vulnerability that is actively exploited in attacks targeting iPhones and iPads.
The vulnerability, tracked as CVE-2021-30883, allows an application to execute commands on vulnerable devices with...
Search engine giant Google announced the formation of a Cybersecurity Action Team to support the security and digital transformation of governments, critical infrastructure, private enterprises, and small businesses. The Google Cybersecurity Action Team intends to guide customers through the...
At the beginning of 2021, when the cybersecurity community was reeling from the aftereffects of the SolarWinds supply chain attack, a new ransomware strain made a disruptive entry. Babuk Locker compromised some of the global corporate networks, encrypted users’...
Microsoft Threat Intelligence Centre (MSTIC) observed DEV-0343, a new activity cluster, conducting extensive password spraying against more than 250 Office 365 tenants, with a focus on U.S. and Israeli defense technology companies, Persian Gulf ports of entry, or global...
Protecting personal information from adversaries has become a challenge for both individuals and organizations. Cybercriminals are leveraging advanced phishing and social-engineering techniques to trick users and break into corporate networks.
Despite necessary protective measures and awareness campaigns, threat actors continue...










![How To Find a Phishing Email [INFOGRAPHIC] Phishing email](https://cisomag.com/wp-content/uploads/2021/10/MicrosoftTeams-image-38-681x440.png)



