fbpx

Industry Trends

A new category to include posts that do not fall under the other categories but are still crucial, like emerging technologies, research, and benchmarks relevant to the backup and disaster recovery industry.

Majority believe malicious AI will circumvent cybersecurity: Enea

Majority believe malicious AI will circumvent cybersecurity: Enea

76% of cybersecurity professionals believe the world is very close to encountering malicious artificial intelligence (AI) that can bypass most known cybersecurity measures. Over a quarter (26%) see this happening within the next year, and 50% in the next five years.  Phishing, social engineering tactics, and malware attacks are those most likely to become more […]

Majority believe malicious AI will circumvent cybersecurity: Enea Read More »

Check Point discovers new phishing scam on Dropbox

Check Point discovers new phishing scam on Dropbox

A new business email compromise 3.0 attack involving the file hosting service, Dropbox has been discovered by Check Point Research.  In the first two weeks of September, CPR observed 5,440 attacks, just another example of hackers masquerading behind legitimate sites with the hope of scamming unsuspecting users via social engineering tactics. Phishing via Dropbox A

Check Point discovers new phishing scam on Dropbox Read More »

Chatbots lower the barrier for entry into cybercrime

Chatbots lower the barrier for entry into cybercrime

The potential risk posed by AI/chatbots in cybercrime has dominated headlines recently. A new report considers how these tools are leveraged to create highly targeted phishing campaigns.   Egress, a cybersecurity company providing intelligent email security, has released its second Phishing Threat Trends Report. The report’s findings demonstrate the evolving attack methodologies used by cybercriminals that

Chatbots lower the barrier for entry into cybercrime Read More »

Ransomware acting within 24 hours of access now: Secureworks report

Ransomware Deployment Speed 24 hours of access now: Secureworks report

Rapid Ransomware Threats Demand Swift Action The latest Secureworks Threat Report highlights a startling fact: Ransomware can compromise systems in under 24 hours. Cybercriminals are advancing quickly, with half of ransomware attacks occurring on the day of initial access. Global Cyberthreats Evolve Secureworks’ Counter Threat Unit pinpoints the growth of “name and shame” tactics, where

Ransomware Deployment Speed 24 hours of access now: Secureworks report Read More »

Celebrating 20 Years Of Cybersecurity Awareness: Secure Our World

Celebrating 20 Years Of Cybersecurity Awareness: Secure Our World

October is a month known for many things: the change of seasons, the approach of Halloween, and, importantly, Cybersecurity Awareness Month. This year is especially momentous as it marks the 20th annual Cybersecurity Awareness Month, a collaborative effort launched by the Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA). The Origin

Celebrating 20 Years Of Cybersecurity Awareness: Secure Our World Read More »

The Anatomy of a Resilient Infrastructure: Mitigating Risks and Ensuring Protection

The Anatomy of a Resilient Infrastructure: Mitigating Risks and Ensuring Protection

The Anatomy of a Resilient Infrastructure: Mitigating Risks and Ensuring Protection Introduction Organisations must take a multifaceted approach to secure their digital assets in an era of rapidly evolving cyber threats. This comprehensive article delves deep into the labyrinth of infrastructure security, examining its various components: the software layer, the hardware layer, and advanced security

The Anatomy of a Resilient Infrastructure: Mitigating Risks and Ensuring Protection Read More »

Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family

Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family

A new ransomware family called 3AM has emerged in the wild after it was detected in a single incident in which an unidentified affiliate deployed the strain following an unsuccessful attempt to deploy LockBit (aka Bitwise Spider or Syrphid) in the target network. “3AM is written in Rust and appears to be a completely new

Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family Read More »

Why existing employees could be the key to closing the cybersecurity skills gap

Why existing employees could be the key to closing the cybersecurity skills gap

In a rapidly digitising world, where Malware-as-a-Service (MaaS) and ransomware attacks are escalating, the need for cybersecurity expertise has never been more important. While companies and boards scramble to recruit top-tier cybersecurity talent, many overlook an untapped reservoir of potential: existing employees. These professionals, already attuned to an organisation’s culture and objectives, could become its

Why existing employees could be the key to closing the cybersecurity skills gap Read More »

Alex Tray: A Multifaceted Talent In System Engineering, Freelance Writing, And Cybersecurity Expertise

Alex Tray: A Multifaceted Talent In System Engineering, Freelance Writing, And Cybersecurity Expertise

In the ever-evolving landscape of technology and information security, individuals who possess a diverse skill set are the driving force behind innovation and resilience. One such individual who stands out in this regard is Alex Tray – a polymath with expertise spanning across system engineering, freelance writing, and cybersecurity. With a passion for learning and

Alex Tray: A Multifaceted Talent In System Engineering, Freelance Writing, And Cybersecurity Expertise Read More »

Scroll to Top