Cloud applications and software have become a key part of everyday life for employees and businesses. Enhance your cyber security awareness to avoid simple errors that can make your cloud an easy target for hackers. The popularity of cloud applications and software has risen significantly in recent years, and while using cloud services can be beneficial […]
The dark web, or darknet, is the part of the internet that is difficult to access without the proper tools and authorizations. An average, everyday web surfer using a commonly-available web browser like Chrome or Explorer isn’t likely to be taking a virtual walk on the dark side, but security leaders still must make an […]
Cyber crime is on the rise, and cyber criminals are exploring new ways of conducting distributed denial of service (DDoS) attacks. Making them harder to protect against and more effective at causing disruption. DDoS attacks are a relatively simple, but potent, form of cyberattack in which cyber criminals overload services with web traffic, slowing them down […]
The security breach that hit Uber last week was the work of Lapsus$.Uber said it is in close coordination with the FBI and US Justice Department on the matter. Lapsus$ is a South American hacking group has attacked a number of technology giants in the past year, including Microsoft, Samsung, and Okta. What Happened? An Uber EXT contractor had […]
Microsoft rolls out a new security feature that should significantly slow down password attacks against Windows devices.The latest preview of Windows 11 ships with the SMB server authentication rate limiter on by default. This makes Windows 11″a very unattractive target” for hackers trying to steal credentials, since it’s much more time-consuming for them to target […]
One of the key components of global trade is also one of the most vulnerable to cyber security threats, which is why cyber security awareness is so important. Global supply chains rely on the smooth running of shipping and ports, but maritime cybersecurity is too often a low priority. Since the whole industry is reliant […]
A stealthy new form of malware is targeting Linux systems in attacks that can take full control of infected devices, and use this access to install crypto-mining malware. This malware has been detailed by cybersecurity researchers at AT&T Alien Labs, they call it Shikitega. This malware targets endpoints and Internet of Things devices that run on Linux operating […]
Targets of ransomware rarely publicly acknowledge attacks. More openness would help everyone. Ransomware is one of the most significant cybersecurity issues we face, as cyber criminals hack into businesses, schools, hospitals, critical infrastructure and more, in order to encrypt files and demand a ransom payment for the decryption key. Despite warnings not to, many victims pay […]
Even if you don’t want iOS 16 yet, updating to iOS 15.7 is still a very good idea to fix security flaws. The iOS 16 update became available on September 12th for the iPhone 8 and newer, changing just about every app or screen of the mobile operating system. Apple iOS/iPadOS 15 and macOS Big […]