Cyber threat detection and response is a well-established area of the cyber security industry today, with a multitude of product and service types and definitions (and many a ‘Magic Quadrant’).
On August 15, the Clop ransomware group announced on their leak website the breach of South Staffordshire Water, a privately owned UK water supply company. This attack is yet another example of ransomware gangs targeting critical infrastructure expecting to receive a big payout, which is reminiscent of hundreds of previous incidents, including the well-known Colonial Pipeline and JBS attacks.
Organizations should implement consistent cybersecurity practices to protect their businesses and employees. Password sharing is a common but risky practice in many workplaces that can leave companies vulnerable to a data breach. Sharing passwords is sometimes unavoidable in the workplace, since many businesses often need multiple employees to access a single user account.
With an urgent need for the deployment of a new biometric and biographic authenticator at the borders, US officials in departments such as the Department of Homeland Security (DHS), U.S. Customs and Border Protection (CBP) decided to use a Facial Recognition Technology over their Manual ID or Document Verification techniques.
General Data Protection Regulation (GDPR) demands the implementation of numerous procedures and processes. A significant portion of this effort will be reflected in your GDPR-compliant Privacy Policy. However, a lot is going on behind the scenes.
Malware has come a long way since it first made the scene in the late 1990s, with news of viruses infecting random personal computers worldwide. These days, of course, attackers have moved beyond these humble roots. Now they deploy a variety of innovative techniques to extract large amounts of money from businesses around the world. A similar development is taking place with malware’s upstart cousin – the emergence of malicious packages being uploaded to package registries.
The software supply chain encompasses anything needed to develop and deliver a product, such as all the components, images, open source libraries, processes, and tools — so securing the supply chain must become a priority. Unfortunately, software supply chain attacks are one of the most pervasive threats that organizations face and they increased more than 300% in 2021, according to a study from Argon Security, part of Aqua Security.
Observing the ongoing conflict between Russia and Ukraine, we can clearly see that cyberattacks leveraging malware are an important part of modern hybrid war strategy. While conventional warfare is conducted on the battlefield and limited by several factors, cyber warfare continues in cyber space, offering the chance to infiltrate and damage targets far behind the frontlines. Russia utilized cyberattacks during the initial phase of the invasion in February.