The pandemic changed the fortunes of many organisations. Perhaps none so much as Zoom, which has found itself becoming a noun synonymous with any form of video call. However, its meteoric rise has not been without some hiccups along the way. There have been many cases of people not securing their meetings, leading to many […]
Unfolding the Twitter security incident
In case 2020 wasn’t dystopian enough, here’s some more unbelievable news. On July 15, 2020, social media giant Twitter admitted it fell victim to a security breach. The attackers targetted 130 Twitter accounts, including several belonging to high-profile individuals such as elected officials; former president Barack Obama; and business leaders including Bill Gates, Jeff Bezos, […]
Can COVID-19 Related Data Breach Worries Stop Your Mergers Or Acquisitions?
The WSJ just reported that the new coronavirus has thrown the M&A dealmaking into disarray. They said: “cybersecurity experts say the workplace upheaval caused by the pandemic will complicate mergers and acquisitions when activity picks up. Countless employees are working remotely on networks that might be vulnerable to attack, while others with access to confidential […]
[Heads Up] Microsoft: Ransomware Gangs That Don’t Threaten To Leak Your Data Steal It Anyway
That means you can from now on count a ransomware infection as a data breach with all the consequences that this brings. Moreover, the so-called “human-operated” ransomware gangs have stepped up their attacks amid the pandemic to maximize their ill-gotten profits. In fact, Redmond also reported that they launched more of the file-encrypting malware on […]
The Real-life Email You Never Want To Get From Your CEO Because The Feds Called…
From The Desk Of Mark *********, CEO, ********* Corporation To all of our valued clients: On February 19th at approximately 3:00 pm Department of Homeland Security contacted me to inform me there was a person or persons on the dark web trying to sell “access” to the our client databases. As company President and Owner […]
IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance
Cyberattacks are a growing threat, and organizations are investing time and money in security strategies to make certain that their infrastructures are secure. Active Directory (AD) is a constant target for compromise, as it’s at the core of any organization’s security — it handles authentication and authorization for all users in an organization. Hardening the […]
Reduce the Risk of Data Breach by Focusing on Compromised Credentials
The bad guys can’t do anything on your network without access. That’s why they focus their efforts on gathering as many sets of credentials as possible. You should focus there too. The cybercriminals don’t just want to get onto a user’s endpoint and simply stop there; their goal is most commonly to monetize the attack […]
This Week’s Five: Security Begins At Home
This Week’s Five is a weekly column of five interesting reads from all over the web, with a different topic every week. This week, we explore the risks of security breach and importance of data protection in enterprise networks. Cyber thieves of all kinds have made the lives of the people in charge of data security miserable; except when they get caught.