Crimes committed within the electronic or digital domains, particularly within cyberspace, have become general. They use technology as a footprint, commit offenses, and create new blueprints for law enforcement, attorneys and security professionals, and the legal departments. Digital Forensics...
Japanese cryptocurrency exchange Liquid admitted that it is a victim of a crypto heist in which unknown hackers accessed digital currency from its digital wallets. Hackers reportedly transferred the compromised cryptocurrency into different wallets. Liquid stated that it’s investigating...
Cyber intrusions are inevitable, and evolving ransomware variants and double-extortion techniques make it even more difficult for organizations to secure their critical digital infrastructure. However, practicing strong security practices will help organizations against ransomware and exfiltration attempts.
With an aim...
The cybersecurity skills gap could hardly have come at a worse time. According to a study by the Centre for Strategic and International Studies (CSIS) focusing on IT decision-makers across eight major countries, 82% of employers have a shortage...
Security researchers uncovered a new cyberespionage campaign by Iranian hackers targeting IT and telecom companies in Israel with supply-chain attacks. Tracked as Siamesekitten (also known as Lyceum or Hexane), the Iranian APT group imitated HR personnel to lure unwitting...
With increased internet usage during the new normal of remote working, phishing attacks continue to challenge business security defenses. Cyberthugs often distribute malicious codes via various kinds of phishing baits, causing severe consequences to organizations’ critical digital infrastructure. A...
There are several types of ethical hackers depending on the hacker’s intent and goal. This article highlights the concepts of hacking and the different types of ethical hackers. But before that, let’s learn what ethical hacking is to understand its categories.
Hacking...
Business email compromise (BEC) is a prevalent email threat to organizations and a lucrative business for hackers. BEC attacks have increased and become more sophisticated in recent times.
By Rudra Srinivas, Senior Feature Writer, CISO MAG
In a BEC attack, hackers use social...
The rising security breaches and vulnerability exploits on the Internet of Things (IoT) indicate that connected devices are never 100% secure. Security researchers from Mandiant, in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), recently discovered a critical flaw that affects...
If we were to participate in a Socrates seminar and deliberate on the importance of securing data, in unison, the response would be: Encryption, the “holy grail” for data security! Data is at the core of all businesses and...