On pace with the spread of the pandemic, cyberattacks exploded across industries in 2021. Hackers took advantage of vulnerabilities in remote work and the continued digitization of business processes to siphon millions of dollars. As we move into the new year, we’re seeing new threats on the horizon, as cybercriminals develop more accessible pathways to launch attacks, race to exploit automated technology, and even prey on the humans who use it.
Welcome to this week’s Weekly News roundup. Here we present the latest news and updates in the world of cybersecurity. From lawmakers pushing for better cybersecurity for the transport sector to fraudsters targeting Android users into premium subscription services without their consent, this week saw several cybersecurity incidents. Here is a rundown: A team of… Read More »Cybersecurity News Weekly Roundup (October 25-29)
Over the last year, there have been multiple instances where cybercriminals have targeted the U.S.’ transportation infrastructure. These include attacks against ferries, railways, and even oil supply chains. These attacks cause widespread disruption in the lives of ordinary citizens. A committee of lawmakers from the Department of Homeland Security will discuss industry-wide measures to improve… Read More »U.S. Lawmakers Push for Better Cybersecurity for Transport Sector
If you have been a frequent user of the internet at least for the past decade (assuming you do not live under a rock) and have multiple accounts in several different websites/applications, then it is highly likely that at least one of your accounts may have been compromised in the millions of data breaches that… Read More »What makes Credential Stuffing attacks so dangerous?
The prestigious Howard University, known for being a historically Black college and university, has become the newest high-profile U.S organization that has fallen victim to a ransomware attack. According to a statement released by the University, “On September 3, the Howard University information technology team detected unusual activity on the University’s network. In accordance with… Read More »Howard University Targeted by a Ransomware Attack
News has spread that Kaseya, which suffered a ransomware attack, received a Universal decryption key from a trusted third party. There is confirmation from relevant authorities that there was no payment for the ransom. But does that mean that all is well? Why isn’t the cybersecurity industry celebrating the victory over this massive ransomware attack?… Read More »Kaseya Hack Solved? – Our Experts Find Kaseya Data on the Dark Web
You are under a DDoS attack; what do you do now? At the outset, do not get hassled. If you have already appointed a cybersecurity provider, its experts will take care of it. However, if you do not have one, and until you call and get someone to take over your systems, and recover from… Read More »DDoS Attack – What to Do Before Cyber Security Companies Take Over?
Cybercriminals evolve with time. They keep coming up with innovative techniques to penetrate networks and execute the intended fraud. Accordingly, phishing, vishing, and smishing have evolved as three prominent cybersecurity threats. Bad actors are continuously in pursuit of networks and users through emails (phishing), vishing (voice and phishing), and smishing (cell phone messages). A single… Read More »Cybersecurity Awareness Among Employees – Compare Phishing VS Vishing VS Smishing
My system is under a malware attack; what to do now? Well, that’s the question many people or companies ask when they identify a malware attack. Yes, a malware attack is undoubtedly serious. But you need not panic. Before the cybersecurity rescue team steps into the scene and takes over your system, you need to… Read More »Malware Attacks – What to Do Before Cyber Security Service Providers Take Over?
Penetration testing enables you to simulate a cyber-attack against your system and detect exploitable vulnerabilities. Also termed ethical hacking, penetration testing works in a fashion similar to real-world hacking. It involves a few critical steps that rigorously check the system and detect loopholes that the company can exploit to determine the strength of its cybersecurity.… Read More »Pen Test Stages: Security Penetration Testing Steps Cyber Security Companies Take