Home Blog Page 50
In addition to attacking techniques, cybercriminals often rely on various mediums to deploy/spread their malware or Trojans across targeted networks. Several threat actor groups rely on social media platforms or instant messaging services like Facebook, Twitter, and WhatsApp for...
The government of Australia has implemented several cybersecurity measures to thwart rising cyberthreats in the nation. As a result, the country has now reported fewer security incidents than last year. According to the Annual Cyber Threat Report 2020–21 from...
The hardening of the cyber insurance market is forcing enterprises to come to terms with the impact their cybersecurity posture has on the bottom line and thus viewing it as more than just an IT issue. As ransomware and...
While there is no guarantee to evade web application risks completely, having a basic idea of the risks can go a long way in mitigating them. It is crucial to know the common types of risks like SQL injections,...
Digital forensics is an essential aspect of tracing computer-based crimes. With the rise in digital transformations and reliance on the web and mobile applications, there’s an augmented need for digital forensic investigators in cybersecurity. Every organization that uses cloud-computing...
While the cyberthreat landscape is crossing boundaries, multiple nations are coming together to safeguard the cybersecurity landscape. Australia, the U.K., and the U.S. recently came together to form a trilateral security partnership known as AUKUS. The new partnership was announced in...
It’s not only about the new normal, but the pandemic is also the beginning of a new era in the cyberthreat landscape. The year 2020 witnessed the emergence of new cybercriminal groups and hacking techniques. Several organizations across the...
Since devices are connected to the internet more than ever before, exploiting vulnerabilities to cross privilege boundaries has become common. Recently, Recorded Future and Insikt Group released the H1 2021: Malware and Vulnerability Trends Report, which talks about how...
Almost every cyberattack report mentions user credentials and passwords being stolen and sold on dark web forums. Be it ransomware, malware or any phishing attack, the core of all these attacks is stolen passwords. Microsoft, with one of the...
The Department of Justice and Constitutional Development of South Africa admitted that its IT systems and operations were disrupted in a ransomware attack. The security incident encrypted all the information systems, making their services unavailable to employees and the...