The FBI is warning users and organizations about the Mamba ransomware that is targeting various entities including local governments, legal agencies, transportation services, technology providers, industrial, commercial, manufacturing, and construction businesses. In a security advisory, the FBI stated the...
On March 23, Honeywell, a well-known U.S.-based industrial tech giant, revealed that it was under a malware attack. The firsthand account states that the intrusion seems to be detected in the early stages of penetration since only a “limited...
Ever since the pandemic hit, companies globally are trying to progress their digital capabilities and rapidly undertaking business transformation initiatives. Despite the revenue declines amid COVID-19, most of the organizations are increasing their cloud security and digital transformation budgets.
Recent...
Seth P. Berman leads Nutter’s Privacy and Data Security practice group and is a member of the firm’s White Collar Defense practice group. As a data privacy attorney, corporations and their boards engage Berman to address the legal, technical...
Threat intelligence analysts from Facebook disrupted cyber espionage campaigns by Chinese state-sponsored cybercriminal groups. Tracked as “Earth Empusa” or “Evil Eye,” the criminal group is allegedly abusing the Facebook platform to target the Uyghur community in China by tricking them into...
Instagram is currently hands-down one of the most popular photo-sharing platforms in the world. With more than 1 billion users (1.16 billion as of Q3 2020) of which 500 million are active daily users posting “Stories” – one of...
The red and white webpage with the message that reads “Ooops, your files have been encrypted!” with a digital timer running on the left is something that still scares doctors across the globe. Even weeks after the infamous WannaCry...
Sometimes, a single negligent act of an employee can put an organization’s critical information at stake. Despite organizations becoming cyber smart to cope with rising cyberattacks, careless or unintentional actions of employees like responding to a phishing email or...
It has been an age-old myth that women prioritize family over work. Women are under-represented in tech and leadership. According to an (ISC)² Cybersecurity Workforce Report, women working in cybersecurity account for about one quarter (24%) of the overall...
Cybercrime continues to be a growing threat and attack methods constantly evolve with each passing day. At the core of almost every successful cyberattack, one thing remains constant: a victim is persuaded in performing the desired action. Whether it’s...














