Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Operation Cronos: The Takedown of LockBit Ransomware Group

On February 20, 2024, the National Crime Agency (NCA) of Britain and the Federal Bureau of Investigation (FBI) announced the successful disruption of the Lockbit ransomware gang, marking a significant milestone in the fight against cybercrime. This operation, known as Operation Cronos, was a collaborative effort involving law enforcement agencies from the UK, the US, and several other countries, with support from private sector partners.

Is It Safe to Text a Password?

No, it is not safe to text a password because text messages are not encrypted. This means anyone can intercept the data being sent through texts, including passwords, placing your accounts at risk of becoming compromised. Continue reading to learn more about password-sharing practices to avoid and how you can share passwords safely with friends, family and colleagues.

Deepfakes vs. Digital Verification: India's eKYC at a Crossroads

In an era where artificial intelligence (AI) crafts indistinguishably realistic deepfakes, India stands at a critical juncture, facing the formidable task of defending its digital domain. These AI-generated forgeries, capable of impersonating individuals with frightening accuracy, pose not just a threat to personal privacy but also to national security, misinformation control, and the integrity of digital transactions.

Unlocking the Future: The Digital ID Revolution in 2024 and Beyond

In the dawn of 2024, the digital landscape is undergoing a profound transformation as digital identity solutions redefine the way we perceive and interact with our identities. This revolution promises a future where our smartphones serve as gateways to our entire identities, offering unparalleled convenience and security.

Top 10 Cybersecurity Questions to Ask Your Vendors: A step-by-step guide to reduce supply chain risk

A cybersecurity vendor questionnaire is vital in assessing the competency and reliability of potential partners. It serves as a comprehensive tool to evaluate various aspects crucial for safeguarding sensitive data and infrastructure. Through detailed inquiries about security protocols, compliance measures, incident response plans, and past breach incidents, the questionnaire helps gauge the vendor’s commitment to robust cybersecurity practices.

Beating LockBit at its Own Game: Law enforcement's takedown of a prolific ransomware group

After a years-long investigation, this week the FBI and law enforcement agencies in the UK and Europe took over the main website of the cybercrime group known as LockBit. Law enforcement additionally arrested LockBit associates in Poland, Ukraine, and the U.S. and the U.S. Treasury imposed sanctions on Russian nationals affiliated with the group. The joint operation re-engineered LockBit’s online system to mimic the countdown clock used by the group in its extortion attempts.

3 2 1... Impact! Early Results under the SEC's Cybersecurity Governance Rule

In July 2023, the SEC adopted a new rule requiring disclosure of “material” cybersecurity incidents and detailed information on cybersecurity risk management, strategy and governance by public companies. With the new rule taking effect in December and annual reports due for public release and consumption in the first few months 2024, companies are scrambling to closely review and hone their cyber programs to address these new reporting requirements.

What you can't do with Kubernetes network policies (unless you use Calico): The ability to log network security events

In my previous blog post, What you can’t do with Kubernetes network policies (unless you use Calico): Advanced policy querying & reachability tooling, I talked about this use case from the list of nine things you cannot implement using basic Kubernetes network policy — advanced policy querying and reachability tooling. In this blog post, we’ll focus on the use case — the ability to log and analyze network security events.

Microsoft Azure Administrator: AZ-104: Manage Costs in Microsoft Azure - Part 18

A critical area of concern for organizations migrating to the cloud is cost. While cloud services have many benefits regarding management, features, and capabilities, without proper cost management, the spend can skyrocket. For the AZ-104 exam and as a Microsoft Azure Administrator, it’s crucial to grasp how cost management tools help identify and implement cost-saving opportunities. Let’s look at how we can manage costs effectively and the tools available, including Azure Cost Management.