With alarming data and statistics sharing the increase in password attacks and rising password compromise and account takeovers, there is a need for a change in login methods and password protection. This text shares password statistics, the need for password protection, novel passwordless approaches, and steps you can take to protect your passwords.
Callback phishing, the latest trick in the attackers’ pockets, can bypass email filters because they do not contain attachments and links with malware. Hence, email filters fail to red-flag them. This article discusses callback phishing so individuals and cyber security teams can remain vigilant about such attacks.
Email threats, phishing, impersonation, and advanced email threats are on the rise, and Tessian’s State of Email Security Report shares valuable intel into how significant these threats have gotten. This text summarizes the report’s findings and shares how organizations can protect against advanced email threats in the coming time.
The digital world is gripped with alarming news and novel scams each week. This week’s cybersecurity bulletin shares the top cybersecurity news covering Russian data breaches, extortion scams, fresh IceXLoader malware campaign, China’s spying activities, and Google’s SEO poisoning. Let us take a look.
This week’s latest cybersecurity bulletin will take you through the top cybersecurity news, sharing how Microsoft has been sued, the UK government’s scanning of all Internet devices, the evolution of Robin Banks phishing, malicious phishing applications on Google Play, how hackers stole $11 million from African banks, and a fresh clipboard stealer replacing crypto wallet addresses.
Every second counts when your organization experiences a data breach. Having a response plan ready before a data breach happens is critical, so you know the steps to respond quickly to minimize the damage. This article discusses how your enterprise can respond to a data breach by taking proactive measures.
Many businesses rely on their email communications for everything from keeping teams updated on each other’s progress, to contacting clients and scheduling meetings. They can’t get by with their voip phone services alone. Without the use of emails, businesses would quickly come unstuck, causing delays to projects and preventing effective customer support. To avoid this, businesses need to invest in email security, protecting this channel of communication and the information that is shared within.
This week’s cybersecurity bulletin covers cybercriminal students getting arrested, Google’s zero-day exploits, a ransomware attack on ACL, the man behind raccoon stealer, LinkedIn’s latest steps to battle malicious actors, and the hive ransomware attack on one of the largest electricity providers.
Australian Health Insurance Provider Medibank Suffers Hack, Says 3.9 Million Customer Records Stolen
Medibank was targeted using stolen login credentials that led the threat actors to its network, allowing them to steal customer records. Medibank is in conversation with the threat actors while Australian federal police investigate the matter and the fate of the customer’s hanging. Here is everything about the Medibank hack, how the cyberattack took place, what Medibank is doing and offering its customers, what will Medibank’s future be, and why cyber insurance and cybersecurity protection is essential for organizations.
As most businesses are moving their operations to the Cloud, misconfigurations are common today, leading to data exfiltration. In this article, we discuss the recent Microsoft data breach, which potentially led to the exfiltration of customers’ data.
Threat actors are developing advanced and sophisticated techniques to target organizations worldwide with new tools. This week’s top cybersecurity news highlights new double extortion tools, why Google is being sued, the FBI’s warning to US students, the cyber espionage campaign on Asian casinos, 2.2 million stolen customer records, and OldGremlin targeting Russia with ransomware.
The best action against cybercriminals is knowing how they operate and carry out malicious activities. This weekly cybersecurity bulletin brings the top cybersecurity news worldwide, covering ransomware attacks against Ukraine, Black Axe cybercriminals behind bars, the Alchemist malware, crypto stealing Solana update campaign, exposed financial information, and unofficial WhatsApp stealing accounts. Let us see how threat actors are using these attacks so you can stay safe.
This week’s cybersecurity bulletin covers headlines that gained attention from the cybersecurity community, extending from pig butchering crypto scams, malware drops, Fortinet vulnerabilities, cryptocurrency theft, data breaches, and ransomware affiliate getting 20 years in prison. Let us see the top cybersecurity news this week.
As evident from the recent Okta, Microsoft, and Twitter breaches, young hackers with sophisticated tools and plenty of time can persuade even the most aware employees into making cybersecurity mistakes. Another such attack came to light recently that targeted Uber, the ride-hailing and food delivery app.
The hacker, BlueHornet, has taunted social media giant, TikTok, claiming responsibility for 2 billion data breach records and sensitive backend source code. This article summarizes the events of the TikTok breach, shares the discovery and denial of the data breach, and how you can protect yourself.
Keeping up with cybersecurity news has become necessary for organizations and experts to engage with the community and understand the mindset of threat actors and protect themselves better. Here are the top cybersecurity news pieces of the past week that caused a significant stir in the digital community. (more…)
Emails form a central part of business communications, enabling teams to collaborate, share documents, and follow up on each other. The ease of sending and receiving messages has many benefits. However, it can also make your business vulnerable to hackers – 96% of organizations have been targeted by an email-related phishing attempt. With this in mind, staying on top of your security has never been more critical.
Your business email servers are responsible for every department and employee’s incoming, and outgoing emails. By ensuring these are secure, you can reduce the number of spam emails finding their way into your system, and identify them efficiently to prevent them from causing future issues. This means your employees can trust their emails as a channel to communicate, not spending time dealing with the risks of hackers or phishing emails.
Keeping up with cybersecurity’s latest is key to avoiding becoming a victim of ever-evolving cyber threats. We are here with another weekly update of the latest cybersecurity news and incidents from around the world to help you achieve awareness and protect yourself from severe cyber threats. Here is this week’s cybersecurity bulletin: (more…)
With IBM’s cost of a data breach report, this article summarizes key statistics, findings, industries targeted, and data breach trends in 2022. It provides various steps organizations can follow to reduce the impact of data breaches in 2022 and beyond.
Cyberattacks are a growing concern for individuals and organizations. With major attacks occurring every week, we must stay up to date with cybersecurity‘s latest for the best protection. Here is a look at this week’s major cybersecurity news: