The world has taken notice of the ransomware attack on the Colonial Pipeline in the U.S. Given the aftermath of the attack, which caused panic and massive fuel shortages across the East Coast, even countries like Japan have initiated...
Businesses have been harrowed with the ever-rising question, “To pay or not to pay ransom?” The FBI had urged companies to avoid ransom payments because it only worsens the situation encourages others. The ransom does not fix the vulnerability,...
Whether it’s between leaders, managers, and workers, vendors, and customers, or companies and regulators, trust lowers the barriers to cooperation and keeps things moving smoothly.
By Matthew Heap, Head of Solution Architecture, APJ for Rackspace Technology
Still, most businesses – and...
The risks from cyber criminals exploiting zero-day vulnerabilities have become a continuous threat for organizations, as they could lead to critical data breaches and cyberattacks. Recently, Android discovered four new critical zero-day bugs which were exploited in the wild....
WhatsApp has recently been in a slew of legal battles in India over its latest privacy policy changes. However, it has now been served a 7-day ultimatum by the Indian government for a complete roll back of all the...
The U.K.’s Information Commissioner’s Office (ICO) has fined a contact tracing service provider Tested.me for misusing users’ personal data. In an official notice, the data regulator announced that it imposed an £8,000 fine (approximately USD 11,300) under section 55A...
Last year cast a shockingly bright spotlight on cybersecurity with the risks that surfaced due to the rise of remote work. The year was capped off by one of the most significant supply chain hacks. This incident, coupled with...
COVID-19 has impacted nearly every industry. Despite the restriction of movement during the pandemic, e-commerce and food delivery services boomed. While the demand for DIY meal kits surged, impersonation scams saw a spike as well. Recently, cybersecurity firm Tessian...
Fearing a situation like the Colonial Pipeline-like hack, the Japanese government is set to impose restrictions on the usage of foreign equipment and technology in its private sector. It will introduce new security regulations for 14 critical infrastructure sectors...
Malicious web shells have been wreaking havoc by enabling remote access, executing arbitrary commands, and controlling servers. It’s a technique mostly used by Magecart threat actors. Recently, security researchers from Malwarebytes found the Magecart Group 12, a cybercriminal gang...














