Cyberattackers now pose as business executives to secure security certificates

Cyberattackers now pose as business executives to secure security certificates

Security certificates are intended to elicit trust in users for the deployment of software, but as with so many other safeguards, threat actors can find…

View More Cyberattackers now pose as business executives to secure security certificates
Why businesses don’t report cybercrimes to law enforcement

Why businesses don’t report cybercrimes to law enforcement

Companies are often compelled to report security incidents such as data breaches to regulators. Companies in the UK, for example, will be legally obligated under…

View More Why businesses don’t report cybercrimes to law enforcement
Online internet secure payment and network safe communication and banking concept. Person pay in web via computer. Locks and padlocks on diagram.

Why remote workers are an underrated security risk for small businesses

Despite the risk, small businesses are largely unaware of security risks associated with remote employees, according to a Nationwide survey. In a new survey from…

View More Why remote workers are an underrated security risk for small businesses
Slack resets user passwords after 2015 data breach

Slack resets user passwords after 2015 data breach

Slack will reset the passwords of users it believes are affected by a historical data breach that affected the company more than four years ago. In…

View More Slack resets user passwords after 2015 data breach
Bug in Anesthesia Respirators Allows Cyber-Tampering

Bug in Anesthesia Respirators Allows Cyber-Tampering

A vulnerability in GE Healthcare’s Aestiva and Aespire anesthesia devices would allow an unauthenticated cybercriminal on the same network as the device to modify gas…

View More Bug in Anesthesia Respirators Allows Cyber-Tampering
More than two million major cyberattacks hit globally last year

More than two million major cyberattacks hit globally last year

Last year saw more than two million major cyberattacks strike businesses across the world. The latest figures by the Internet Society’s Online Trust Alliance claim that these…

View More More than two million major cyberattacks hit globally last year
US wants to isolate power grids with 'retro' technology to limit cyber-attacks

US wants to isolate power grids with ‘retro’ technology to limit cyber-attacks

The US is very close to improving power grid security by mandating the use of “retro” (analog, manual) technologies on US power grids as a…

View More US wants to isolate power grids with ‘retro’ technology to limit cyber-attacks
Cybersecurity staff burnout risks leaving organisations vulnerable to cyberattacks

Cybersecurity staff burnout risks leaving organisations vulnerable to cyberattacks

Cybersecurity professionals are overworked and stressed out to such an extent that it threatens to provide hackers and cybercriminals with a better chance of conducting…

View More Cybersecurity staff burnout risks leaving organisations vulnerable to cyberattacks
When asked about the New York Times report earlier on Monday, Kremlin spokesman Dmitry Peskov said: “...Undoubtedly this information shows the hypothetical possibility... and all signs of cyber war and military cyber action against the Russian Federation.” Peskov said unnamed strategic parts of the Russian economy had endured foreign cyber attacks many times in the past and that the authorities were constantly working to try to keep the economy and what he called sensitive parts of its safe.

Russia thwarts U.S. cyber attacks on its infrastructure: news agencies

Russia has uncovered and thwarted attempts by the United States to carry out cyberattacks on the control systems of Russian infrastructure, Russian news agencies cited…

View More Russia thwarts U.S. cyber attacks on its infrastructure: news agencies
What is Attack Surface Analysis and Why is it Important?

What is Attack Surface Analysis and Why is it Important?

This article describes a simple and pragmatic way of doing Attack Surface Analysis and managing an application’s Attack Surface. It is targeted to be used…

View More What is Attack Surface Analysis and Why is it Important?