Tag: Cyberattacks
Million Dollar Business: Ransomware Gangs Scooped $350 Mn in 2020
Ransomware attacks were the most observed security threats among various cybercriminal activities in 2020. Cybercriminals target victims by encrypting their sensitive files, with an...
Zoom’s Video-teleconferencing Platform Still at Risk: FBI Warns
Despite regular security updates and features, cyberthreats on Zoom applications have become rampant. In the wake of the pandemic, the popular video conferencing platform...
Pledge to Backup Your Data This World Backup Day
Information is new money in this modern digital world. Everything revolves around information, and it has become the fuel for many businesses. For instance,...
Ziggy Ransomware Gang Announces Shutdown; Offers to Refund Ransom Payments
Whether it is a discount or inadvertent deduction, getting a refund is always a delight for everyone. But what’s unbelievable is receiving the same...
“I personally believe girls are naturally blessed analysts and can make...
COVID-19 has changed the ways businesses operate today. Like health care and banking, cybersecurity was one of the most impacted industries with phishing and...
Reviewing Critical Infrastructure Information Governance Practices in the Aftermath of Recent...
There are necessary and important data security needs in the nation’s public sector critical infrastructure services, such as water and wastewater treatment facilities, transportation,...
Why Zero Trust Model is a Top Priority for Security Leaders...
Ever since the pandemic hit, companies globally are trying to progress their digital capabilities and rapidly undertaking business transformation initiatives. Despite the revenue declines...
The Cancer in the Health Care System
The red and white webpage with the message that reads “Ooops, your files have been encrypted!” with a digital timer running on the left...
Five Social Engineering Trends to Watch for 2021
Cybercrime continues to be a growing threat and attack methods constantly evolve with each passing day. At the core of almost every successful cyberattack,...
Unleashing XDR to Transform Enterprise Threat Detection and Response
Have you ever wondered why during the outbreak of war, it’s not just one of the armed forces that’s deployed — Army, Navy, Air...