Apple Files Lawsuit Against NSO Group for State-sponsored Surveillance
Israel’s cyber intelligence and surveillance company NSO Group is once again in a legal row.
On November 23, 2021, Apple stated that the company has...
Being Compliant Gives Organizations a False Sense of Security
While cybersecurity awareness is improving within organizations, they are failing with threat protection because they are unaware of the threats they are facing in...
Cloud Computing Is the Future and Here Are the Latest Trends
In today’s world of hyper-connectivity enterprises are investing in hybrid Cloud solutions, PaaS systems, augmented reality, and open-partner ecosystems. If the past has taught...
Vestas Cyberattack Impacts Internal IT Systems
Vestas Wind Systems, a Danish manufacturer, seller, installer, and servicer of wind turbines, was a victim of a cybersecurity incident and had to shut...
‘SharkBot’ Android Trojan Found Targeting Banking Apps and Crypto Exchanges
A new botnet, dubbed “SharkBot,” is targeting Italy, the U.K., and the U.S., including banking applications and cryptocurrency exchanges.
The Cleafy TIR team discovered the...
4 in 10 Organizations Do Not Employ a CISO: Report
Organizations across the world have experienced swift changes in their business operations during the new normal. In particular, the adoption of the distributed work environment...
CISA, NCSA, ACSC Warn of Iranian APT Actors Exploiting Microsoft and Fortinet Flaws
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), and the United Kingdom’s National...
Cybersecurity is a Low Priority for India’s Private Sector
In the movie Die Hard 4.0, John McClane and a young hacker team up to thwart the plans of cyber-terrorist Thomas Gabriel in Washington...
3 Steps Businesses Can Take to Protect Themselves From Software Supply Chain Attacks
In August, the White House hosted a meeting with some of the most powerful CEOs in the world; from Apple to JPMorgan. The topic...
Top 5 Skills Every SOC Analyst Needs to Have
As the landscape of cyberthreats expands, it is imperative for enterprises to focus on employing security operations center analysts, also known as SOC analysts,...