The most trending cybersecurity news last month was about the Pegasus Spyware incident. This isn’t the first time we’ve heard about Pegasus; remember the 2019 incident where Pegasus was infecting phones through WhatsApp? However, the issue garnered a lot...
By 2022, 90% of new enterprise applications will be cloud-native. Yet, 50% of organizations find that native security controls are inadequate and have added third-party solutions to fully meet their needs. While cloud-native security is on the rise, does it...
API security has often been a blind spot for enterprises. In fact, it’s very common to see unauthenticated APIs. In most cases, these mostly occur due to overlooked authentication and authorization protection for the APIs in the development process....
While cloud computing is helping organizations in advancing their operations, data leaks due to cloud misconfigurations are giving nightmares to businesses. A threat analysis from cybersecurity research firm WizCase revealed a data breach that affected Reindeer, an American marketing...
Microsoft 365 Defender Threat Intelligence Team uncovered an ongoing malware campaign tricking victims into downloading malware on the targeted systems. The campaign, dubbed as BazaCall, is reportedly leveraging bogus call centers and duping social engineering victims to download BazaLoader...
If your office computer is working fine under a secure network, it is because your system administrators work relentlessly to keep the organization running securely. The system administration personnel are responsible for various operations in an organization, such as...
In May 2020, CISO MAG reported about Project Signal, an Iranian state-sponsored ransomware operation. State-sponsored actors from Iran have often been linked to various cyberespionage campaigns targeting organizations globally. A recent report by Sky News exposed a trove of...
The rising sophistication observed in recent cyberattacks confirms that cybercriminals are constantly enhancing their computer skills and hacking techniques. According to research from BlackBerry, several malware authors are leveraging exotic programming languages to advance their hacking skills and evade...
Analyzing pieces of evidence found in a digital device is a laborious task. The challenges of which are further augmented by the ever-changing methods and technologies adopted by threat actors. Digital forensics applies scientific methods to analyze and recreate...
There is no shortage of cybercriminal groups on the dark web. New threat actor groups and ransomware cartels continue to make their presence felt in the threat landscape. Cybersecurity researchers from threat intelligence firm Recorded Future recently spotted a...














