Home Blog Page 48
Digital evidence, also known as electronic evidence, offers information/data of value to a forensics investigation team. Every piece of data/information present on the digital device is a source of digital evidence. This includes email, text messages, photos, graphic images,...
Europol and the European Commission are working with international security collaborations to disrupt cybercriminals and their operations globally. Recently, Europol dismantled over 106 organized threat actors linked to various cybercrimes, including SIM swapping, money laundering, and other online frauds. As...
In a recent announcement, the People’s Bank of China issued a blanket ban on cryptocurrency activity like trading and mining in the country. The announcement sent the global crypto market into a tizzy. The market had already suffered a major...
The government of Australia is urging civilians and organizations to be vigilant about online scams that are reported more often in the country. So far, Australians have reported over $211 million in losses to online scams this year –...
With a mission to provide cybersecurity to individuals to safeguard themselves from threat actors, a Pune-based (Maharashtra, India) cybersecurity enthusiast came up with a password management solution in the form of a smart device. By Minu Sirsalewala, Editorial Consultant, CISO...
The emerging and advanced technologies in the digital age create new security challenges for cybersecurity specialists. The application security vulnerability is the latest threat in an organization's ever-growing challenges amidst other cyber threats. No industry sector is safe from...
Cyberattacks and malicious campaigns are becoming rampant, with new cybercriminal operations being reported more often in the security landscape. Recently, security experts from Cisco Talos uncovered a cyber espionage campaign, tracked as Armor Piercer, targeting employees in the government...
Increased use of Conti ransomware in more than 400 attacks on the U.S. and international organizations has been observed by the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI). The agencies issued a joint...
While the Biden administration is severely trying to curb ransomware attacks, threat actors continue to target the critical infrastructures in the country. Farm services provider NEW Cooperative is the latest victim to join the bandwagon of ransomware attacks. The...
A new backdoor used by the Russian Turla APT group to keep the attacks live has been discovered, which has been reported to be active in the U.S., Germany and Afghanistan in recent times. It is also known as...