COOs Will Make Impact-Based Security a Mainstream Requirement
Cyber risk management accounts for the probability of attacks on operational technology (OT) at large industrial facilities, including all the components that control equipment,...
HawkEye Malware: Technical Analysis
HawkEye, also known as PredatorPain (Predator Pain), is a malware categorized as a keylogger, but over the years, it has adopted new functionalities that...
Ransomware spreading through Microsoft Teams
Black Basta ransomware, a notorious cybercrime group, has recently resurfaced in the news for its new and alarming method of spreading file-encrypting malware through...
Protecting Against Inevitable Insider Threats
The seven pillars of the Department of Defense (DOD) Zero Trust Reference Architecture provide a comprehensive framework for securing today’s organizations. However, the data...
Microsoft denies using Office 365 data for training its AI Intelligence
For the past two days, social media platforms have been abuzz with claims that Microsoft, the software giant, has been using the data generated...
Elon Musk AI Robot Doomsday strengthens after China Uprising Video Emerges
Nearly five years ago, Elon Musk, the visionary entrepreneur behind Twitter and a self-proclaimed interim President of the United States according to some media...
Illegal Movie Piracy Streaming service taken down and malware spread investigation impending
A major illegal piracy streaming service was dismantled in a joint operation led by Italy’s Postal and Cybersecurity Police Service, in collaboration with Europol,...
How to Defend Against Thanksgiving and Black Friday Online Cyber Attacks
As the holiday shopping season kicks off, two of the most anticipated events for online retailers and shoppers alike are Thanksgiving and Black Friday....
HCL and Intel offer Data Trust Shield for Cloud Environments CyberVolk ransomware details
HCL and Intel Join Forces to Safeguard Data in Cloud EnvironmentsAs cloud environments continue to evolve as the backbone for modern digital infrastructure, they...
Fancy Bear Threat Actor launches Nearest Neighbor Cyber Attacks
Over the years, we’ve witnessed a range of cyberattacks targeting everything from personal computers and smart devices to the increasingly vast array of connected...
MOST POPULAR
The Underestimated Cyber Threat: Anticipating and Combatting Supply Chain Attacks
By Prasad Sabbineni, Co-Chief Executive Officer at MetricStream
Cybersecurity threats are multi-faceted, often connected, and accelerating fast. Ransomware, nation-state attacks, employee errors, and third parties...