Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyber Insurance - Does it Create More Problems than it Solves?

Welcome to Razorwire, where we and our expert guests tackle the issues and opportunities in the world of cybersecurity. In this episode, we explore the challenges and issues faced by the cyber liability insurance industry. This podcast looks into the complex challenges surrounding cyber insurance, an increasingly crucial topic for security leaders and organisations. Join your host James Rees and cybersecurity specialists Chris and Iain, as they engage in an enlightening discussion about the problems with cyber insurance.

GhostLocker: The New Ransomware On The Block

Over the past week, an establishment of a new ransomware franchise has emerged named GhostLocker. Ghost Locker is a new Ransomware-as-a-Service (Raas) established by several hacktivist groups led by GhostSec. Recently, many hacktivist groups have tried to engage in cybercrime activities in order to sustain themselves and GhostLocker seems to be one of these cases. In fact, some ransomware groups have already migrated to using GhostLocker instead of their original products.

A Look at CISA's Top Routinely Exploited Vulnerabilities

Knowing what vulnerabilities interest malicious actors is a critical step in assessing the risk of vulnerabilities found in your environment. On August 3rd, CISA released their Top Routinely Exploited Vulnerabilities report for the year 2022 and inside comes little surprise as to most of the culprits. Bugs tied to ransomware incidents continue to dominate the eyes of the agencies behind these joint advisories in hopes that the number of complete owns will diminish.

ManageEngine PAM360 now automates privileged access routines for over 800 enterprise apps-powered by Zoho Flow!

We are delighted to announce that ManageEngine PAM360 will now utilize Zoho Flow’s extensive product gallery to automate privileged access security workflows for more than 850 business applications and enterprise IT management tools.

Creating a Threat Hunting Lab in Graylog

When I was looking to break into the cybersecurity industry, I found myself overwhelmed with the sheer amount of content to learn and try. So much of the content, you had to purchase certain things, or it was way too complicated for me to understand at the time. Today, I wanted to break down create an easy walk-through on how to set up a functional threat hunting lab.

Cyber Nightmares: 8 of the Biggest Data Leaks and Hacks of 2023

It’s that not-so-wonderful time of the year when we look at the most significant data leaks, breaches, and hacks in 2023. This year, data leaks remain a consistent threat to our data, with an average cost of $4.35 million. This article looks at some of the most significant cyberattacks that happened throughout the year, what caused them, how the business reacted, and valuable tips on protecting yourself from the cyber world’s biggest threat.

Could Your Parents Spot This Mobile Phish?

When was the last time you received a phishing attempt through text? I’m guessing it was earlier this week, if not at some point today. Being part of the cybersecurity community keeps us watchful and aware of the ways scammers try to steal our information. But how adept are our parents at spotting these scams? The dangers of online scams and mobile phishing are real and everywhere. Yet, many of our parents and grandparents are navigating this new form of deception without much understanding.

Cybersecurity Trends to Watch in the US in the Next 5 Years

As cyber threats grow more frequent and sophisticated, the need for vigilant defense is paramount, and cybersecurity is top of mind for organizations nationwide. Understanding the threat landscape and current and future trends is crucial to designing effective security strategies to mitigate risk and keep companies, their employees, and their data safe. The following threat trends are of particular importance, affecting organizations of all sizes.