By Abhilash On March 9, 2021, Verkada, a software company that specializes in making security cameras for monitoring physical access control, was subject to a security hack. Hackers gained access to the video feed of at least 15 thousand cameras deployed across various locations and exposed the inner workings of hospitals, clinics, and mental health […]
Five worthy reads: Location intelligence—the key to next-level data utilization
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore the rising scope of location intelligence in improving the overall customer experience. By Abirami A The pandemic has pushed businesses out of their comfort zones and boosted digitization. Organizations have started to […]
2021 Phishing Trends Face Alarming Predictions and Will Likely Include Automated Attacks
Researchers at INKY warn that targeted phishing attacks will continue throughout 2021, as some employees return to the office and others continue working from home. They predict that spear phishing attacks will begin to grow more automated, allowing more attackers to launch these attacks. The researchers expect to see the following five trends for the […]
Five worthy reads: The unexpected costs following a cyberattack
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the worst data breaches that happened recently, their impact, and the cost of data breaches for companies. The COVID-19 pandemic has not only had an impact on the mental and […]
Is the cloud coming to all of us?
By Muhammad Firdaus During the past twenty years, so much has changed in the IT office. Two decades ago, we were still using dial-up modems. Now, the entire world wide web is at our fingertips, and our world of IT is more efficient but complicated too. A few significant IT trends have also developed during […]
Microsoft Patch Tuesday April 2021 fixes 108 vulnerabilities, including 5 zero-days
By Gokila Kumar Yet another month, yet another Patch Tuesday. With the never-ending cybersecurity threats brought on by the pandemic, it’s essential to understand the importance of Patch Tuesday releases and find ways to efficiently deploy the new updates to remote endpoints. This Patch Tuesday, Microsoft has released fixes for 108 vulnerabilities, among which 19 […]
3 Ways To Protect Your Identity Online
Within security awareness training programs, cybersecurity experts promote various tactics and best practices to implement within personal and work environments to protect your identities online and reduce the risk of theft or privacy loss. While these concepts seem like a broken record to some people, here are 3 best practices that can significantly reduce the […]
Phishing Attacks Using PDF Files Have Skyrocketed
Phishing attacks using PDF files have spiked over the past year, according to researchers at Palo Alto Networks’ Unit 42. “From 2019-20, we noticed a dramatic 1,160% increase in malicious PDF files – from 411,800 malicious files to 5,224,056,” the researchers write. “PDF files are an enticing phishing vector as they are cross-platform and allow […]
Microsoft Patch Tuesday March 2021 fixes 82 vulnerabilities, including 2 zero-days
With cybersecurity threats on the rise thanks to the pandemic, it’s essential to understand the importance of Patch Tuesday releases, and find ways to deploy them to remote endpoints efficiently. This Patch Tuesday, Microsoft has released fixes for 82 vulnerabilities, among which 10 are classified as Critical, and 72 as Important. Along with these vulnerabilities, […]
Ransomware in 2021: What has changed? Detection and mitigation strategy
A ransomware attack is a bug that we can’t shake off. Or perhaps, it can even be called a shape-shifter that somehow finds a way into networks, no matter how many armed sentries you’ve deployed in and around your perimeter. The line between ransomware and a data breach is slowly fading. Threat actors prefer ransomware […]