Threat

The Threat of Data Scraping for Marketing to Cybersecurity

In the digital age, data is often referred to as the “new oil.” Its importance cannot be overstated, especially in the realm of marketing. Marketers are constantly seeking ways to gather data to gain insights into customer behavior, preferences, and trends. One of these methods is data scraping, which, when used unethically or without proper […]

Email inboxes are vulnerable to sophistication driven cyber attacks

In today’s digital world of communication, a vast amount of information is stored and processed through email communication. This includes sensitive data related to financial transactions, healthcare, professional endeavors, and personal conversations with loved ones. Consider this scenario: a malicious hacker gains access to email credentials through phishing techniques and subsequently takes control of the […]

Deepfake: Unveiling the Emerging Cybersecurity Threat

With the rapid advancement of artificial intelligence (AI) technology, a new and concerning cybersecurity threat has emerged: deepfakes. Deepfakes are highly realistic manipulated videos or audio recordings that can convincingly depict individuals saying or doing things they never actually did. This innovative technology poses significant challenges in preserving trust, compromising privacy, and enabling various forms […]

USB Pen Drives posing as a great cyber threat to IT Infrastructure

USB Pen Drives also called as Removable pen drives are posing as a great cyber threat to IT Infrastructure says research carried out by IBM X-Force and another research carried out by Honeywell Cybersecurity claims that 52% of cyber attacks are targeted at the removable media. In both cases, removable media or USB drives is […]

THREAT HUNTING: IS YOUR SECURITY OPERATION READY TO LAUNCH SUCH A PROGRAM?

This post was originally published by (ISC)² Management. It could be a blended attack as slick as a multichannel marketing campaign. Or a spontaneous crime of opportunity by a single dis-gruntled employee. It could even be an innocent configuration error. When a threat exists, there will be indicators. The perennial challenge is to hunt for […]

Major Mobile Security Threats of 2019

As businesses are going mobile, data security seems to be a top precedence for most enterprise leaders in 2019. And that’s because securing information at every level has become a priority than just a necessity. So, Cybersecurity Insiders has outlined a list of major Mobile Security Threats of 2019 which might hinder the growth of […]

Ransomware attack on US 2020 election data

US officials along with some dignitaries from the white house are worried that the voter registration database and polled results data of upcoming 2020 elections will be vulnerable to cyber threats such as a ransomware attack. According to a report of Reuters, Homeland Security’s Cybersecurity Infrastructure Security Agency (CISA) has reacted to the issue early […]

Top 15 Cyber Threats for 2019

CYFIRMA, a cybersecurity intelligence division of Antuit Group has come up with the list of cyber threat predictions for 2019. The firm adds in its predictive analysis that hackers will see to capitalize on GDPR, invade more cloud platforms for vulnerabilities and expand the use of multi-homed malware attacks in the coming year. The Texas-based […]

Russia invades into digital systems of Ukraine Government Agencies

Ukraine’s Computer Emergency Response Team along with Foreign Intelligence Service claims that a new strain of Pterodo Windows Backdoor virus was found targeting the computer systems of government agencies running in Ukraine. And the investigating officials suspect that this could be a conspiracy of Russia which could be planning large-scale cyber attacks in near time. […]

DARPA launches Cyber Attack on US Power Grids

The Defense Advanced Research Projects Agency(DARPA) has launched a cyber attack on a power utility located in Plum Island, some 1.5 miles off the shore to Long Island, New York. The objective behind the attack was to experiment on how the power utilities can bounce back in the case of ‘Blackout’ scenarios via cyber attacks […]

Share this page