News & Updates

ISTARI, University of Cambridge education program to elevate cyber leaders into business leaders

Cybersecurity advisory firm ISTARI is partnering with the Cambridge Judge Business School (CJBS) at the University of Cambridge to deliver global education aimed at elevating technical cybersecurity leaders into “transformative business leaders.” The Navigator program features four days of in-person learning led by an academic faculty alongside industry-leading experts, the two parties said.

The curriculum is based on ISTARI’s proprietary framework for building cyber-resilient organizations and covers cybersecurity and business leadership development topics, combining leading theory and best practices.

To read this article in full, please click here

News & Updates

Russia-linked Sandworm APT uses WinRAR in destructive attacks on Ukraine’s public sector

CERT-UA is warning of destructive cyberattacks conducted by the Russia-linked Sandworm APT group against the Ukraine public sector. Russia-linked APT group Sandworm is behind destructive cyberattacks against Ukrainian state networks, the Ukrainian Government Computer Emergency Response Team (CERT-UA) warns. The Sandworm group (aka BlackEnergy, UAC-0082, Iron Viking, Voodoo Bear, and TeleBots) has been active since 2000, it operates under the control […]

The post Russia-linked Sandworm APT uses WinRAR in destructive attacks on Ukraine’s public sector appeared first on Security Affairs.

News & Updates

Meta Takes Down Malware Campaign That Used ChatGPT as a Lure to Steal Accounts

Meta said it took steps to take down more than 1,000 malicious URLs from being shared across its services that were found to leverage OpenAI’s ChatGPT as a lure to propagate about 10 malware families since March 2023.
The development comes against the backdrop of fake ChatGPT web browser extensions being increasingly used to steal users’ Facebook account credentials with an aim to run
News & Updates

Securing Your Digital Fortress: A Brief Guide on Managing Passwords

In a world that’s yearning to interconnect, with an ever-expanding plethora of
online services and platforms, a recent wave of cybersecurity incidents has
vaulted online threats to the top of a growing list of concerns.

In the current environment, individuals must keep a precise record of passwords
to ensure privacy and keep their personal information from falling into the
wrong hands. Thus, finding the perfect way to store and manage these passwords
has become crucial more than ever, as data l

News & Updates

Authorities Dismantle Try2Check Card-Checking Platform; $10 Million Bounty on Administrator’s Head

Authorities have dismantled the notorious Try2Check card-checking platform,
which generated tens of millions of dollars in revenue and enabled
cybercriminals to defraud countless victims.

A four-count indictment was unsealed in the US District Court for the Eastern
District of New York, accusing Denis Gennadievich Kulkov of computer intrusion,
access device fraud and money laundering. The charges are tied to Kulkov’s
alleged involvement in operating Try2Check, a leading service that provided
“c

News & Updates

City of Dallas shut down IT services after ransomware attack

The City of Dallas, Texas, was hit by a ransomware attack that forced it to shut down some of its IT systems. The IT systems at the City of Dallas, Texas, have been targeted by a ransomware attack. To prevent the threat from spreading within the network, the City has shut down the impacted IT […]

The post City of Dallas shut down IT services after ransomware attack appeared first on Security Affairs.

News & Updates

Richtiger Umgang mit Passwörtern: So schützen Sie Ihre digitale Festung

In einer Welt, in der alles und jeder vernetzt ist und die Zahl der Dienste und
Plattformen jeden Tag zunimmt, hat die jüngste Welle an Cybervorfällen
Online-Bedrohungen an die Spitze einer wachsenden Liste aus Sicherheitssorgen
katapultiert.

Angesichts der aktuellen Lage müssen wir unsere zahlreichen Passwörter immer im
Auge behalten, um unsere Privatsphäre zu wahren und unsere persönlichen Daten
vor fremden Zugriff zu schützen. Dadurch wird es umso wichtiger, die Speicherung
und Verwaltung di

Scroll to Top