Home Blog Page 71
Days after reports of cyberespionage campaigns by Chinese state-sponsored actors targeting the Indian power sector, security researchers uncovered a new cyber operation by suspected Pakistani hackers. Cybersecurity firm Lumen’s Black Lotus Labs recently uncovered a new remote access trojan...
Cybercriminals and ransomware operators often play with their hacking skills, targeting victims for sensitive information. Despite enhanced security measures, threat actors targeted all sectors during the pandemic, and the online gaming industry has been the most affected. According to research...
Not long ago, President Joe Biden passed an Executive Order encouraging the initiation of stronger cybersecurity reforms across the public and private sectors in the country. It was specifically aimed at closing the gaps and fixing the loopholes that...
New threat vectors are emerging every day and it’s a challenge for organizations to tackle them with basic cybersecurity measures. Governments and organizations across the globe are looking for additional resources and cybersecurity collaborations to deter the evolving cyberthreat...
Business Email Compromise (BEC) attacks have become the most common email threats across various sectors, giving rise to many social engineering and financial frauds. In a BEC attack, threat actors initially pilfer credentials of targeted business email accounts, and...
Belgium has been a hotbed for cyberattacks. First, the country’s leading internet service provider (ISP), Belnet, was being attacked with multiple instances of DDoS attacks. The aftermath of the cyberattack was felt on Belgium’s government and private sector organizations,...
The rapid pace of Digital Transformation has unleashed a high volume of cyberthreats. This is making cybersecurity and compliance a top priority for CXOs and making it critical for businesses to ensure their cyber-regulatory compliance roadmap is in place....
Ever since the pandemic hit, organizations across the globe stepped up their cybersecurity and automation operations, which also increased opportunities for skilled cybersecurity professionals in the industry. Organizations are looking for advanced talent and further adoption of AI technology...
Veeam Software, a modern-day data protection solution provider, has announced the launch of its new federal government-focused subsidiary, Veeam Government Solutions (VGS), Inc. Given the volume and sophistication of ransomware attacks, Veeam aims to deliver modern data protection to...
In addition to advancing hacking strategies, cybercriminals often try different tactics to evade security detections. In one such tactic discovered recently, security researchers from Elastic Security disclosed that a new image tampering attack, dubbed Process Ghosting, is being used...