Data Privacy


VM-expert landed up in jail for planning cyber extortion in New Jersey!

VM-expert landed up in jail for planning cyber extortion in New Jersey!

VM-expert landed up in jail for planning cyber extortion in New Jersey!

by Duocircle

 

A New Jersey-based core infrastructure engineer at a US industrial firm got arrested as he locked out Windows admins from 254 servers. He was trying to target his employer and, in the process, landed up in prison. Daniel was a specialist in hosting virtual machines or VMs.

(more…)

What is a quid pro quo attack?

What is a quid pro quo attack?

 

‘Quid pro quo’ is the Latin term that literally means ‘this for that,’ meaning a mutual exchange. Although the term itself doesn’t indicate an illegal act, threat actors leverage this social engineering tactic to offer something valuable or helpful in exchange for information or access to a system. 

(more…)

North Korea-backed cyber group prying into critical US infrastructure!

North Korea-backed cyber group prying into critical US infrastructure!

North Korea-backed cyber group prying into critical US infrastructure!

by Duocircle

 

A cyber-espionage group backed by North Korea has been sneaking into the vital intellectual property and technical information of the US. The group is a part of North Korea’s foreign intelligence service. From aerospace to defense, engineering companies to nuclear science, the group has been prying into critical infrastructures. (more…)

US bans the Kaspersky antivirus: Here’s what you need to know

US bans the Kaspersky antivirus: Here’s what you need to know

US bans the Kaspersky antivirus: Here’s what you need to know

by DuoCircle

 

You probably know by now that cybersecurity isn’t just about protecting your computers and data from threat actors, but it has broader implications that go as far as national security. Yes, it’s true! Case in point: the recent ban on Kaspersky antivirus software by the US government.

(more…)

Cybercrime Surge: The Automotive Sector Under Siege!

Cybercrime Surge: The Automotive Sector Under Siege!

 

The automotive industry is known for its stability. Even when it received a significant setback during the COVID-19 phase, the automobile industry managed to come out of the dark phase and increased its sales to 75.3 million units. By the end of 2033, the global automotive industry is expected to be worth a whopping $7 million.

(more…)

Kevin Mitnick- One of The Greatest Showmen in the Cyber World!

Kevin Mitnick- One of The Greatest Showmen in the Cyber World!

Kevin Mitnick- One of The Greatest Showmen in the Cyber World!

by Duocircle

 

Kevin Mitnick is an unforgettable name in the history of cyber crimes. He was known by the name of “The World’s Most Famous Hacker.” An American computer security consultant, bestseller author as well as famous security speaker, Kevin David Mitnick created ripples in the cybersecurity world with his notorious hacking stints.

(more…)

Check Point Research Q1 2024 Results- Microsoft, Google, and Linkedin Topped the List; Airbnb is a New Entry

Check Point Research Q1 2024 Results- Microsoft, Google, and Linkedin Topped the List; Airbnb is a New Entry

Check Point Research Q1 2024 Results- Microsoft, Google, and Linkedin Topped the List; Airbnb is a New Entry

by Duocircle

Check Point Research has released the latest report enlisting the top 10 phishing brands for Q1 2024. Microsoft topped the list, with 38% of phishing attacks targeted at it, while Google and LinkedIn experienced 11% of attacks each. What’s surprising is Airbnb’s entry with 1% of attacks; this could be due to the seasonal holiday surge, specifically among travelers preferring to stay at unique accommodations.

(more…)

Cyber Security vs Ethical Hacking: What’s the Difference?

Cyber Security vs Ethical Hacking: What’s the Difference?

Cyber Security vs Ethical Hacking: What’s the Difference?

by Duocircle

 

Are you struggling to safeguard your organization’s data from the plague caused by malicious attacks such as spoofing, DDoS, phishing, malware, etc.? In your pursuit of a secure and resilient future for your organization, we are sure you must have come across the term “cyber security strategy” quite often! Do you think it is just another buzzword, or does it carry real significance?

(more…)

Cybersecurity Conferences that CISOs Should Attend in 2024

Cybersecurity Conferences that CISOs Should Attend in 2024

Cybersecurity Conferences that CISOs Should Attend in 2024

by Duocircle

 

How do you stay one step ahead in a world where cybersecurity threats evolve faster than a click? One of the best ways to stay on top of your cybersecurity game is to cultivate a comprehensive understanding of the various determinants that shape the cybersecurity landscape—major threats, emerging technologies, regulatory changes, etc. And what better way to gain insights into all of this and more than by attending conferences?

(more…)

A Guide to Navigating the Cyber Threat Landscape for Teenagers

A Guide to Navigating the Cyber Threat Landscape for Teenagers

 

Do your children take lessons or play games online? Do they spend significant time on the internet downloading songs or simply browsing through the treasure trove of information available online?

(more…)

Top Cybersecurity Challenges that Will Plague the 2024 US Elections

Top Cybersecurity Challenges that Will Plague the 2024 US Elections

Top Cybersecurity Challenges that Will Plague the 2024 US Elections

by Duocircle

 

National security is generally associated with protecting the borders, but in this hyperconnected digital world, there’s more to ensuring a nation’s safety than just safeguarding the borders from external threats.

(more…)

Another Instance of Nissan Data Breach: 100K People Affected Across New Zealand and Australia

Another Instance of Nissan Data Breach: 100K People Affected Across New Zealand and Australia

Another Instance of Nissan Data Breach: 100K People Affected Across New Zealand and Australia

by Duocircle

 

Nissan, the Japanese car manufacturing company, experienced a mind-boggling ransomware attack on December 5, 2024, resulting in a complete frenzy across Australia and New Zealand. This is not the first time that Nissan has come under the radar of cybercriminals. Earlier, this automobile company faced attacks such as proof of concept exploitation, source code leak issues, and data breach cases. Apparently, the notorious Akira ransomware gang is the mastermind behind this cyber scam. They have claimed to have scraped a whopping 100GB of data.

(more…)

What is Cybercrime-as-a-Service or CaaS?

What is Cybercrime-as-a-Service or CaaS?

Don’t we all love it when tasks become easier for us? And by saying ‘all’ we unfortunately have to include cybercriminals as well. What we are talking about today is cybercrime-as-a-service or CaaS– a model that has democratized cybercrime by allowing even budding malicious actors to wreak havoc with just a rudimentary understanding of cyber menaces, access to the internet, and some money. 

(more…)

Understanding Global Data Compliance Laws in 2023

Understanding Global Data Compliance Laws in 2023

 

The responsibility of handling data comes with its own intricacies, but adhering to global data compliance laws makes the situation a bit sorted. By sorted, we don’t mean easy, but rather uniform. These laws are introduced to safeguard the privacy of customers and users while ensuring companies run their operations using the requisite details and documents. Moreover, adhering to these laws and best practices reflects your concern about cybersecurity, which consequently boosts your image as a responsible and trusted company.

(more…)

AI Models Are Stealing Your Passwords By Listening To Your Keyboard

AI Models Are Stealing Your Passwords By Listening To Your Keyboard

 

In a recent study, Cornell University researchers have uncovered a startling new threat to cybersecurity: the use of AI models to steal passwords by analyzing the acoustic side-channel, or the sounds made while typing on a keyboard. This AI model achieved an alarming 95% accuracy rate in stealing passwords — the highest accuracy seen without the use of a language model, which emphasizes the need for increased vigilance in digital security.

(more…)

Are MortalKombat Ransomware and Tengyun Snake Attacks Emerging Email Threats?

Are MortalKombat Ransomware and Tengyun Snake Attacks Emerging Email Threats?

Listen to this blog post below

 

Attachment-based malware threats are not dying out, they are now a persistent threat. Researchers discovered a new ransomware threat, MortalKombat, in early 2023 that spreads through phishing emails and targets victims worldwide. MortalKombat and Tengyun Snake are the emerging email threats that made experts wonder whether detection-based approaches are enough today.

(more…)

Pin It on Pinterest