A Detection and Response Benchmark Designed for the Cloud

Cloud attacks are becoming faster and more sophisticated, often taking only 10 minutes to execute after finding an exploitable target, according to the “Mandiant M-Trends 2023” report. Existing security methods are not adequate for these threats. A new cloud-centred 5/5/5 Benchmark – five seconds to detect, five minutes to triage, and five minutes to respond […]

Reverse engineering the top skill professionals want to enhance

Reverse engineering and malware analysis were the most popular Expert Training courses offered by Kaspersky this year, the cybersecurity firm said. Students spent an average 560 minutes on each course and 20 hours in Kaspersky’s Virtual Lab studying malware in a secure environment.

Gang of 5 Employees Stole The Customer Data

Five software programmers hacked their own company’s server, stealing sensitive customer data, then formed a new business offering the victims discounted services. The employees, based in Chennai and Bengaluru, performed the heist late at night, then acted shocked when it was discovered. After the owner noticed changed credentials for their Amazon Web Services operating system, […]

Privacy and data security are ‘imperative for every financial organisation’ in the Middle East

Kingston Technology is urging banks and investment firms to beef up their data security amidst an evolving environment of digital threats. Cyber attacks pose substantial risks to financial institutions, resulting in legal and reputational repercussions. Antoine Harb, team leader at Kingston Technology, recommended that finance sector organizations adopt next-generation devices, such as the Kingston IronKey […]

5 Steps to Assessing Risk Profiles of Third-Party SSE Platforms

Adopting a Secure Services Edge (SSE) approach to cybersecurity can enhance an organization’s information security, but can also introduce risks. To mitigate these, businesses should assess the risk profile of potential SSE platforms by checking their compliance and certifications, evaluating their reputation and history, assessing data security measures, reviewing service-level agreements and examining their commitment […]

Indian Hack-for-Hire Group Targeted U.S., China, and More for Over 10 Years

Appin, an Indian hack-for-hire group, has reportedly conducted a decade-long espionage and surveillance operation targeting the U.S., China, Myanmar, Pakistan, and other countries. Initially an educational start-up, Appin began covert hacking operations in 2009. Tools it developed include “MyCommando”, which helped clients conduct a wide range of cyberattacks. Appin has denied connections to the hacking […]

it doesn’t have to be like this

Transgender individuals in the UK have faced a difficult year with increased hate crimes, bullying, and suicide. Public misconceptions have fueled negative attitudes and transphobia. The article calls for change through greater government action and societal acceptance to mitigate these problems. It suggests shortening wait times for NHS appointments, introducing anti-bullying initiatives in schools, and […]

MIPS 2024 What are the New Policies for Third Party Intermediaries (Part IV)

P3 Care, a MIPS qualified registry, has published an update on MIPS 2024 policy changes, focusing on the role of third-party intermediaries in MIPS reporting. The new policies address intermediaries in terms of data aggregation, submission, technology integration, performance analysis, regulatory compliance, and education and training. It notably includes the elimination of Health IT vendors […]

Ahead of the Curve: Kaspersky’s projections for 2024’s Advanced Threats Landscape – CRN

The rise of AI tools will enhance spear-phishing, mobile device and smart devices exploits will intensify, and hacktivism will increase amid geopolitical tensions, according to researchers at Kaspersky. They predict an increase in state-sponsored cyberattacks, growing numbers of hack-for-hire groups, increased use of kernel rootkits, and advanced attacks on Managed File Transfer systems. The researchers […]