Cybersecurity
Linux Under Cyberattack, New Phishing Attacks, MFA Pass The Cookie Hack – Cybersecurity News and Trends
1. Linux Environment Under Cybersecurity Attack Threat actors are continually leveraging file-less malware installation techniques to target Linux-based systems and evade cybersecurity threat detection tools. According to cybersecurity researchers, a variant of RansomEXX, designed specifically for Linux-based systems, is targeting victims’ computers by encrypting user files with a 256-Bit key. Additionally, threat actors have been seen targeting PostgreSQL databases running [Read More]
5 Ways to Beat Sophisticated Threat Actors with IT Automation
The Center for Strategic and International Studies (CSIS) and McAfee estimated that organizations around the world could experience $600 Billion worth of annual losses resulting from cyber-attacks in this current decade. Meanwhile, by the end of 2021, the total number of newly developed Windows OS-based malware is expected to grow by 91.09 million in volume. Many organizations are turning to IT automation [Read More]
JetBrains Breach, US Formally Blames Russia for SolarWinds Hack; Babuk Ransomware – Cybersecurity News and Trends
A Widely Used Software Company, An Entry Point For Huge U.S. Government Compromise State intelligence agencies disclosed that a popular software company (JetBrains), based in the Czech Republic and founded by three Russian engineers, is likely the entry point that Russian-sponsored threat actors used to insert back doors into numerous large technology companies and major U.S. government systems. SolarWinds, one [Read More]
The 5 big wins every new CISO needs in the first 90 days
As of 2020, the average cost of a successful cyber breach is $3.9m – 12% up from last year. It’s not surprising that companies have high expectations when they hire a CISO. COVID-19 has introduced unique security challenges for the incoming CISO. Working from home has accelerated endpoint security risks. Many organizations face expanded cybersecurity attack surfaces due to bring-your-own-computer [Read More]
SolarWinds State-Sponsored Supply Chain Attack vs. Standard Supply Chain Attacks
Supply chain attacks became a threat actor’s goldmine in 2020. With its low barrier to entry and effectiveness, different levels of threat actors continue to leverage supply chain attacks as a viable method to facilitate far-reaching nefarious activities, including espionage, sabotage, intellectual property theft, etc. Although the average supply chain attack is perpetrated by a cybercriminal with purely financial interests, [Read More]
Cybersecurity in 2020: Year End Review
The year 2020 definitely made its way into everyone’s ‘naughty list’ for different reasons. Of course, COVID-19 was the chief reason, but we shall highlight more reasons in this article. The world faced an overwhelming number of cyber threats in 2020: ransomware attacks increased by 715%; business email compromises (BECs) and phishing exploits were more sophisticated than ever before; third party and state-sponsored supply chain attacks shook [Read More]
Our Response to the SolarWinds Hack – A Global Cyber Pledge
Why should I take the #globalcyberpledge? How we're solving cybersecurity by individuals coming together and getting educated? What is the need for continuous improvement? Our privacy and freedom are under attack by foreign, state-sponsored bad actors and we’re standing by letting it happen. Why? Because the answers are right in front of us yet we remain complacent. Back in [Read More]
How Financial Organizations Can Recover From and Prepare for a Ransomware Attack
The recent proliferation of ransomware attacks is staggering; the virtual working environment, driven in part by the way COVID-19 exacerbated the situation. One security vendor, Skybox Security, found that, thus far, ransomware incidents grew by 72% throughout the pandemic. It's likely that your financial institution is already taking the threat of a ransomware attack seriously. But does your firm have a [Read More]
Was the SolarWinds Hack Preventable?
The scope of the SolarWinds hack continues to expand as SolarWinds has updated their security advisory to show that more versions of the company’s Orion server software were impacted by the vulnerability than was previously thought. Furthermore, the Department of Homeland Security issued an emergency directive about the endpoint security breach telling federal agencies to shut down their servers until further notice. SolarWinds provides network administration, monitoring, and [Read More]
The Importance of Vulnerability Scanning in a WFH Environment
Vulnerability scanning in the new WFH environment has become more critical than ever in identifying weaknesses, but how can IT teams keep up?
How & Why Intelligent Automation Delivers Sustainable Cybersecurity
Adding intelligent automation like artificial intelligence & robotic process automation to your cybersecurity arsenal will help you to achieve sustained security across your technology environment.
Why Cyber Hygiene Automation is Key to Mitigating Risk
3 ways to maintain cyber hygiene and mitigate risk using automation in an ever-expanding virtual working environment, which isn't going anywhere any time soon.
Get Updates Right In Your Inbox
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.