-
"Security Solutions In A World Of IoT Devices"Internet of Things (IoT) devices pose unprecedented levels of risk for exploitation. According to security experts, anything connected to the Internet is potentially hackable. Therefore, securing connected devices is a challenge that electronics…
-
"How User Experience and Behavioural Science Can Guide Smart Cybersecurity"Human error was responsible for 82 percent of cybersecurity breaches in the last year. For example, the Colonial Pipeline ransomware attack that brought down the largest fuel pipeline in the US and caused shortages resulted from a compromised password…
-
"Australia Is Considering a Ban on Cyber Ransom Payments, but It Could Backfire. Here's Another Idea"In less than two months, Australia experienced two of the largest personal data breaches in its history, the first involving Optus and the second involving Medibank. In both cases, the hackers attempted and failed to extort a ransom in exchange for not…
-
"The Top 12 Password-Cracking Techniques Used by Hackers"As cryptography and biometrics became more widely available, the flaws in the password authentication method became more apparent. Weak and easy-to-guess passwords are common, as the UK's National Cyber Security Center (NCSC) discovered that one in every…
-
"Unpatched Zimbra Platforms Are Probably Compromised, CISA Says"According to a new cybersecurity advisory by the Cybersecurity and Infrastructure Security Agency (CISA), security teams running unpatched, internet-connected Zimbra Collaboration Suites (ZCS) should go ahead and assume compromise and take immediate…
-
"Canadian Supermarket Chain Sobeys Hit by Ransomware Attack"Sobeys, a Canadian supermarket and pharmacy chain, is recovering from a cyberattack that might have involved the Black Basta ransomware. Sobeys is the second largest supermarket chain in Canada and a wholly-owned subsidiary of Empire Company…
-
"Containers: The Ultimate Trojan Horse"Containers are designed to be unchangeable. Once created, the image is permanent, and all container instances spawned from it will be identical. Furthermore, because the container is defined as code, its contents, intents, and dependencies are all…
-
"Supply Chain Compromise and Disinformation Rank High in EU's Top 10 Cyber Threats"After engaging in an 8-month foresight exercise, the European Union Agency for Cybersecurity (ENISA) has identified and ranked the top cybersecurity threats expected to emerge by 2030. ENISA's top emerging cybersecurity threats include supply chain…
-
"Australia Considers Ban on Ransomware Payments After Medibank Breach"The Australian government recently announced that it is considering banning ransomware payments in response to the Medibank data breach. The group behind the hack has been linked by the Australian Federal Police (AFP) to Russian cyber-criminals…
-
"Ransomware Gang Offers to Sell Files Stolen From Continental for $50 Million"LockBit ransomware group is offering to sell files allegedly stolen from German car parts giant Continental for $50 million. Continental reported in August that it had been targeted in a cyberattack that resulted in hackers accessing some of its…
-
"Thales Denies Getting Hacked as Ransomware Gang Releases Gigabytes of Data"French aerospace, defense, and security giant Thales claims to have found no evidence of its IT systems getting breached after a well-known ransomware group published gigabytes of data allegedly stolen from the company. LockBit last week published…
-
"Man Arrested in Ontario For Alleged LockBit Ransomware Involvement"A Russian and Canadian national has recently been charged with conspiracy to intentionally damage protected computers and to transmit ransom demands in connection with the LockBit global campaign. Mikhail Vasiliev, 33, was apprehended in Bradford,…
News