Home Blog Page 65
Unpatched vulnerabilities are no less than potential cyberattacks. They might blow up the company’s security defense at any time. While some unpatched flaws get identified and addressed during regular security audits, some are left behind until hackers find and...
Businesses shy away from disclosing security incidents. And some companies only reveal after sustaining the damages.  Recently, Saudi Arabia’s state oil giant Saudi Aramco confirmed that it has suffered a data breach that exposed some of the company’s files...
Whether it’s accidental or hacker intrusion, data breach incidents affect an organization in multiple ways. It could lead to severe security risks if the leaked data is misused or abused by threat actors. Cybersecurity researchers from WizCase, a web...
In the current scheme of things, saying, “ransomware attacks are on the rise” is an understatement. Ransomware attacks exploded eight months ago, targeting U.S. hospitals, followed by attacks on critical supply chains of Colonial Pipeline, JBS, and Kaseya. These...
Technologies like AI, ML, and IoT are experiencing explosive growth in the digital world. But do you know what is the source of inspiration for these disruptive technologies? Sci-fi books and movies. An  example of IoT’s influence can be...
Cloud computing has already revolutionized the way businesses operate. Several organizations jumped the bandwagon of deploying multiple cloud environments into their IT infrastructure. Organizations are using various cloud services to store confidential corporate data. According to a survey, nearly 90%...
Not all malware variants are available on underground darknet markets. Some criminal syndicates design and supply them, especially for state-sponsored cyberattacks. In a recent investigation, security researchers identified new spyware created by Candiru (also known as SOURGUM), an Israel-based...
The COVID-19 pandemic has created havoc not just in the lives of people but also rocked the business world globally. With countries going into lockdown, businesses are today forced to adapt to the situation and operate remotely. With this,...
Schneider Electric, an energy management and automation company, has reportedly patched 13 critical vulnerabilities in its EVlink range of products. The EV product range is associated with electric vehicles and offers charging points/stations for private properties, semi-public car parks, and on-street...
Social media handles are the primary target for cybercriminals to impersonate high-rated profiles for malicious activities. Recently, Facebook disrupted several fake accounts operated by an Iranian threat actors group targeting military personnel. As per Facebook’s threat intelligence analysts, the cybercriminal...