Home Blog Page 51
Digital forensics is an essential aspect of tracing computer-based crimes. With the rise in digital transformations and reliance on the web and mobile applications, there’s an augmented need for digital forensic investigators in cybersecurity. Every organization that uses cloud-computing...
While the cyberthreat landscape is crossing boundaries, multiple nations are coming together to safeguard the cybersecurity landscape. Australia, the U.K., and the U.S. recently came together to form a trilateral security partnership known as AUKUS. The new partnership was announced in...
It’s not only about the new normal, but the pandemic is also the beginning of a new era in the cyberthreat landscape. The year 2020 witnessed the emergence of new cybercriminal groups and hacking techniques. Several organizations across the...
Since devices are connected to the internet more than ever before, exploiting vulnerabilities to cross privilege boundaries has become common. Recently, Recorded Future and Insikt Group released the H1 2021: Malware and Vulnerability Trends Report, which talks about how...
Almost every cyberattack report mentions user credentials and passwords being stolen and sold on dark web forums. Be it ransomware, malware or any phishing attack, the core of all these attacks is stolen passwords. Microsoft, with one of the...
The Department of Justice and Constitutional Development of South Africa admitted that its IT systems and operations were disrupted in a ransomware attack. The security incident encrypted all the information systems, making their services unavailable to employees and the...
Microsoft released fixes for 60 security vulnerabilities in its latest September 2021 Patch Tuesday update. Out of 60 vulnerabilities, 56 were determined as important, and four as critical bugs existing in Microsoft Windows, SharePoint Server, Edge browser, Azure Sphere,...
Anti-forensics techniques are designed to frustrate digital forensics investigators. They comprise tact and tools to hoodwink digital forensics investigation. Besides, cybercriminals use anti-forensics tools to hide their footprints from computer forensics experts after a data breach or malware campaigns. This...
The future of cloud computing and the corresponding information security is and should be the prime concern for every business, provided a majority of them are migrating or aiming to shift to the cloud to further develop their business...
The rise of IoT devices in the health care sector led to various potential cyber risks. The usage of wearable devices like fitness bands and health trackers has become rampant lately. The security of fitness trackers becomes a perennial concern...