Threat

Can Passwordless Tactics Help Thwart Major Cyber Threats?

In today’s digital landscape, cybersecurity has become an ongoing concern for organizations and individuals alike. As cyberattacks evolve in sophistication, one of the most significant vulnerabilities remains the traditional password-based authentication system. Passwords, once a cornerstone of online security, are increasingly being targeted by cybercriminals through techniques like phishing, brute force attacks, and credential stuffing. […]

Is quishing the new phishing? Protecting your business against the next threat vector

By Andy Swift, Cyber Security Assurance Technical Director at Six Degrees Since they first appeared in the 1990s, quick response (QR) codes have rapidly become intertwined in our daily lives. Used today for everything from ordering food to paying for parking or undertaking virtual tours at a museum exhibition, QR codes make it convenient and […]

Whitehall vulnerable to Cyber Attacks and malware threats

Whitehall, a term that refers both to the British government administration and a specific geographic location in central London, has recently garnered attention for its vulnerability to cyberattacks. This issue stems primarily from the reliance on outdated IT infrastructure, a problem that has left critical government departments exposed to potential breaches. The findings were outlined […]

Protection Against Deepfake Cyber Threats: Navigating the Future of Digital Security

The rise of deepfakes, artificial media that use AI to create hyper-realistic yet entirely fabricated images, videos, or audio, has created a new wave of cyber threats. While the technology behind deepfakes offers creative and entertainment potential, it has also opened up significant security vulnerabilities for individuals, businesses, and even governments. Deepfakes can be used […]

Cyber Threat from Bonnie Blue and Lilly Phillips of OnlyFans

For some time, Cybersecurity Insiders have been alerting readers to the various cyber threats, such as ransomware, malware, crypto-mining software, and DDoS attacks. However, a new and unusual trend has recently gained momentum, rapidly trending on search engines. A woman named Bonnie Blue has claimed to have participated in a “S@# marathon” in a London […]

Can Failing to Log Out from Online Accounts Pose a Cybersecurity Threat?

In today’s digital age, online accounts have become an integral part of our personal and professional lives. From banking to social media, email to work-related platforms, the number of accounts we manage is ever-increasing. However, many users are unaware of the potential risks associated with simply neglecting to log out of these accounts, especially when […]

The Most Notorious Cyber Threat Groups: A Global Overview

In the digital age, cyber threats have evolved from isolated incidents to organized, sophisticated attacks that can target governments, corporations, and individuals worldwide. Among these threats are cybercriminal groups, state-sponsored hackers, and hacktivists that operate under various motives—ranging from financial gain to political objectives. Some of these groups have earned infamy due to their highly […]

Cybersecurity Strategy: Understanding the Benefits of Continuous Threat Exposure Management

The cybersecurity industry is littered with buzzwords, technologies and acronyms that can often be overwhelming for security professionals doing their best to keep up and ensure their organizations are being adequately protected. Naturally, it’s the leading analyst, research and consulting agencies that security practitioners listen to the most when it comes to making decisions regarding […]

Google to launch threat detection AI powered feature to all Android phones

Google is preparing to introduce a new threat detection feature for its Android 14 and 15 operating systems by the end of this year. This innovative feature aims to enhance device security by preventing unauthorized access in the event of theft or snatching. When the device detects suspicious activity, such as being grabbed and the […]

How Sanctions Can Help in Fighting State-Sponsored Ransomware Actors

In recent years, the threat posed by state-sponsored ransomware actors has become increasingly pronounced, with malicious cyber activities orchestrated by governments or their proxies posing significant risks to global cybersecurity. As these actors continue to exploit vulnerabilities in critical infrastructure and institutions worldwide, there is a growing consensus among cyber-security experts and policymakers that sanctions […]

Share this page