After Phishing and Identity Thefts, LockBit 2.0 Operations Rise in Australia
Australians have become a target for different kinds of cyberattacks lately. The Australian Competition and Consumer Commission (ACCC) reported an 84% surge in identity theft...
These are the Top 4 Cybersecurity Skills In-demand in 2021
Amidst growing cybercrime and cyberthreats, it is wise for businesses to hire professionals with cybersecurity skills. The pandemic-induced lockdown has changed the way we...
“I expect security options to evolve over time with the rollout of 5G”
The potential threat posed by cyberterrorism has crippled both government and security experts. Whether it is cable news, newspapers, websites or social media, “cyberthreat”...
CISA Unveils Joint Cyber Defense Collaborative to Boost Cybersecurity
The increase in the number of cybercriminal groups and ransomware cartels makes it difficult for organizations to stop the threat single-handedly. Cyber collaborations from...
“I am eagerly waiting for more innovation in incident response and supply chain security”
According to Israel National Cyber Directorate, Israeli cyber companies raised $3.36 billion in the first half of 2021, an amount that constitutes about 41%...
Federal Agencies Score Poor in Securing Sensitive Data: Senate Report
Companies lose trust when they fail to protect user data or implement necessary security advancements. Organizations bear the blame whenever attackers exploit unpatched vulnerabilities...
A CEO’s Guide to Cybersecurity
Agile methodologies and cloud-based services and models have become popular, and in accordance with this change, the c-suite has restructured processes within their organizations....
Suffered a Data Breach? Here’s the Immediate Action Plan
Sensitive information is like money to cybercriminals. Attackers leverage personally identifiable information (PII) exposed in data breaches to launch various cyberattacks or trade it...
CISO MAG – AUGUST 2021
Cybercrime is evolving faster than ever, as adversaries devise new strategies and embrace disruptive technologies for new types of attacks like cryptojacking, supply chain...
Alert! Fraudulent Call Centers Tricking Users to Download BazaLoader Malware
Microsoft 365 Defender Threat Intelligence Team uncovered an ongoing malware campaign tricking victims into downloading malware on the targeted systems. The campaign, dubbed as...













