U.S. State Department Hit by Cyberattack; Breach Extent Unknown
In a recent tweet, Jacqui Henrich, the White House correspondent for Fox News, reported a cyberattack on the U.S. State Department. The breach was...
Japan-based Liquid Crypto Exchange Hacked; Nearly $100Mn Stolen
Japanese cryptocurrency exchange Liquid admitted that it is a victim of a crypto heist in which unknown hackers accessed digital currency from its digital...
Why Skills Gap is an Opportunity for a New Approach to Building Strong Cybersecurity...
The cybersecurity skills gap could hardly have come at a worse time. According to a study by the Centre for Strategic and International Studies...
Iranian APT Group “Siamesekitten” Targets Israeli Firms in a Cyberespionage Campaign
Security researchers uncovered a new cyberespionage campaign by Iranian hackers targeting IT and telecom companies in Israel with supply-chain attacks. Tracked as Siamesekitten (also...
“Privacy Enhancing Technologies can allow organizations to pursue data sharing while remaining compliant”
If we were to participate in a Socrates seminar and deliberate on the importance of securing data, in unison, the response would be: Encryption,...
Everything You Need to Know About the Evolution of Cyberthreats
The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An...
FireEye Mandiant to Provide Cyber Defense to Alpine F1 Team
If the pandemic had played a spoilt sport for ardent Grand Prix fans and deprived them of the adrenaline rush, “The Hungarian Grand Prix...
7 in 10 Organizations in India Likely to Suffer a Data Breach Next Year:...
Enhancing security defenses with a robust incident response plan is the only way to become immune to data breaches. From trading in darknet forums...
NCSC for Startups Initiative will Address U.K.’s Cybersecurity Challenges
Bringing the technical expertise of both public and private organizations will help mitigate security gaps and boost the overall cybersecurity posture in the country....
Identity as the New Perimeter
In this day and age, your identity is a shared asset. Be it a calling card, passport or license -- it’s the means by...














