Home Blog Page 68
If you work in a cybersecurity team, you will be under much pressure these days. According to the latest industry reports, the ongoing pandemic has further widened the demand-supply gap for cybersecurity talent. But this shortage was a challenge...
State-sponsored actors from Russia have a long history of cyberattacks across the world. There are numerous cyberespionage campaigns linked to Russian hackers. Recently, the federal agencies of the U.S. and the U.K. warned about a series of brute-force attacks...
The exponential rise of cryptocurrency value attracted both investors and cybercriminals at large.  A recent investigation by Lookout, an endpoint-to-cloud security firm, uncovered multiple cryptomining scams operated via fake cryptocurrency Android apps. Fake Crypto Apps The researchers found more than...
When reporters asked the infamous bank robber Willie Sutton why he robbed banks he allegedly replied, “because that’s where the money is”. It was only a matter of time that cybercriminals, specifically, ransomware extortioners, started to target their currency...
Cybercriminals often enhance their phishing tactics to lure unwitting users into downloading malware. In one such new phishing threat uncovered by security researchers from Proofpoint, threat actors are tricking users into opening/downloading a malicious file disguised as a Privacy...
The global pandemic led to swift digitization that eventually opened doors to several security issues. Cybercriminals are taking advantage of the situation by exploiting the loopholes in organizations’ networks. Small and medium enterprises (SMEs) have sustained severe challenges to...
Secrecy is important for sending encrypted messages over the internet. Sensitive personal information is often exchanged while remaining vulnerable to hacks, leaks, etc. To make matters worse, we voluntarily accept the risk while being forced to trust the process....
Ransomware operators at times announce shutdown of their operations but continue with a new ransomware variant. Some attackers create new ransomware infusing capabilities from the old one. Recently security researchers from Fortinet discovered a new ransomware dubbed Diavol targeting...
Hackers are breaching our nation’s critical infrastructure and with security threats lurking in the enterprise, Zero Trust adoption continues to rise. According to Cybersecurity Insider’s Zero Trust Adoption Report, 78% of IT security teams plan to implement a Zero...
Though IoT devices continue to assist with smart connectivity and communication, there are high potential risks involved. For instance, a new investigation from the consumer advocacy organization Which? revealed that smart homes could suffer over 12,000 IoT attacks in a week....