Cybersecurity Tools

IT Governance Podcast 19.5.23: A Capita special, featuring pension providers, Colchester City Council and Alan Calder’s analysis

This week, we look at the wider repercussions of the Capita ransomware attack, and how numerous clients have been affected, including the Universities Superannuation Scheme and other pension providers. Plus, accusations of another Capita breach and Alan Calder on what all organisations can learn from the attack and Capita’s response. Also available on Spotify, Amazon Music, Apple Podcasts and SoundCloud.

The post IT Governance Podcast 19.5.23: A Capita special, featuring pension providers, Colchester City Council and Alan Calder’s analysis appeared first on IT Governance UK Blog.

Cybersecurity Tools

Why are we still talking about email security?

By Deryck Mitchelson, Field CISO EMEA, Check Point Software Technologies. Email security compromises are among the costliest in cyber. Last year, organizations lost over $2.7 billion in email fraud. Does this really need to continue, given the tools and resources available to security leaders?  The vast majority of CISOs do implement email security. However, there’s an […]

The post Why are we still talking about email security? appeared first on CyberTalk.

Cybersecurity Tools

State-Sponsored Cybercrime Group`s Infrastructure Revealed

Researchers have uncovered previously unknown attack infrastructure used by Pakistani and Chinese entities operated by the state-sponsored group SideWinder. In a joint report, cybersecurity companies Group-IB and Bridewell say the threat actor uses 55 domains and IP addresses. At least since 2012, SideWinder has been active, using spear-phishing attacks to gain access to targeted environments. Among the […]

The post State-Sponsored Cybercrime Group`s Infrastructure Revealed appeared first on Heimdal Security Blog.

Cybersecurity Tools

EDR vs. Antivirus: Choose the Best Security Solution for Your Endpoints

Nowadays your business and your data need a carefully thought protection suit for at least two reasons. First, cybersecurity threats are becoming more numerous and more sophisticated as time goes by. Just think that 450.000 types of malware are noticed day by day. You are compelled to stay up to date with the newest malicious […]

The post EDR vs. Antivirus: Choose the Best Security Solution for Your Endpoints appeared first on Heimdal Security Blog.

Cybersecurity Tools

Five Years of the EU General Data Protection Regulation and Data Protection Act 2018

For many outside the data privacy and IT governance, risk management and compliance sectors, the GDPR (General Data Protection Regulation) seemed to appear five years ago as if from nowhere. It had barely made the news before May 2018, but in the weeks running up to its effective date of 25 May 2018 it gained the sort of media coverage and popular interest that most aspirant celebrities can only yearn for. (Indeed, the European Commission proudly shared in a since-deleted infographic that ‘GDPR’ was googled more often than Beyoncé or Kim Kardashian.) The Regulation’s time in the media spotlight didn’t

The post Five Years of the EU General Data Protection Regulation and Data Protection Act 2018 appeared first on IT Governance UK Blog.

Cybersecurity Tools

Ransomware in the Name of Charity: MalasLocker Targets Zimbra

A new ransomware operation has been observed hacking Zimbra servers to steal emails and encrypt files. Instead of demanding a ransom payment, the threat actors claim to require a donation to charity. In March 2023, a ransomware operation dubbed MalasLocker began encrypting Zimbra servers, with victims reporting encrypted emails in both BleepingComputer and Zimbra forums. Users claimed […]

The post Ransomware in the Name of Charity: MalasLocker Targets Zimbra appeared first on Heimdal Security Blog.

Cybersecurity Tools

iDenfy’s biometric identity verification will enhance security for Coinmerce

iDenfy, the digital ID verification, compliance, and fraud prevention startup, teamed up with Coinmerce, the crypto investment platform that offers its users an easy way to buy, sell and swap various cryptocurrencies. Now, iDenfy will help welcome newly registered Coinmerce users by authenticating their identities using biometric verification. While crypto fraud rises, businesses seek new […]

The post iDenfy’s biometric identity verification will enhance security for Coinmerce appeared first on SecureBlitz Cybersecurity.

Cybersecurity Tools

U.S. Transportation Department Breach Exposes Data of 237,000 Employees

The US Department of Transportation (USDOT) recently revealed threat actors breached its system in a cyberattack. The data breach compromised the personal information of roughly 237,000 current and former agency employees. While it remains unclear when the attack happened or who are the threat actors, USDOT made the announcement just a few days before the […]

The post U.S. Transportation Department Breach Exposes Data of 237,000 Employees appeared first on Heimdal Security Blog.

Cybersecurity Tools

What Is a Brute Force Attack? Definition, Prevention and Examples

Cyber criminals have many sophisticated techniques to hack people’s devices and steal their login credentials, but one of their most successful methods is also their simplest: brute force. In this blog, we explain how brute force attacks work, why they differ from methods such as phishing and malware, and the ways organisations can prevent intrusions. What is a brute force attack? A brute force attack is a method of criminal hacking that involves breaking into a system by guessing usernames and passwords. Fraudsters do this through trial and error. They know that many people use commonly used passwords, so it

The post What Is a Brute Force Attack? Definition, Prevention and Examples appeared first on IT Governance UK Blog.

Scroll to Top