Business Email Compromise: The Most Common Threat Vector Across Sectors
Business Email Compromise (BEC) attacks have become the most common email threats across various sectors, giving rise to many social engineering and financial frauds....
Birlasoft and Regulativ.ai Co-Develop AI-Led Cyber-Regulatory Reporting Platform
The rapid pace of Digital Transformation has unleashed a high volume of cyberthreats. This is making cybersecurity and compliance a top priority for CXOs...
What is Penetration Testing? What Does a Penetration Tester Do?
Ever since the pandemic hit, organizations across the globe stepped up their cybersecurity and automation operations, which also increased opportunities for skilled cybersecurity professionals...
Carnival Cruise Line Hacked Second Time in Two Years
Recently, the U.S. Centers for Disease Control and Prevention (CDC) gave a green signal to Carnival Cruise Line to commence operations on the condition...
Paying Ransom is the Primary Solution for 60% of Organizations: Study
Despite several notices and awareness programs, most organizations are still paying ransom for data decryption post a ransomware attack. Earlier, the FBI warned companies...
Episode #11: Supply Chain Attacks and Vulnerability Disclosures
In the past year, we have seen accelerated adoption of digital platforms and technologies. For instance, more businesses and individuals are turning to e-commerce...
The Edward Don Ransomware Attack – A Reminder of Disruption Caused by Cyberattacks on...
Ransomware attacks targeted towards supply chains in the U.S. have spiraled indiscriminately in the recent past. The incidents are growing by the day, and...
Attackers Target Volkswagen Vendor; 3.3 Mn Audi Customers Impacted
Security risks are everywhere, they could be from state actors or insiders (employees) you are working with. As cyber risks are evolving by the...
DoJ Takes Down Largest Stolen Credentials Marketplace ‘Slilpp’
Most cybercriminals and ransomware groups operate from different locations, making it hard for law enforcement agencies to track them down. Several governments are making...
Cybersecurity Posture of Commonwealth Entities Continues to Improve: Report
Last year, owing to the rapid surge in cybercriminal activities in Australia, Prime Minister Scott Morrison announced that the country had allocated a budget...