Types of Penetration Testing
In today’s corporate environment, there is no doubt that security is now one of the main issues being addressed. Literally every day, you hear about Cyber hackers attacking into computer systems and serves, stealing everything from passwords to financial information and data. No matter how hard the management and IT teams at these businesses try to combat these types of security breaches, the hacker is always one step ahead. In fact, this can be very much likened to that of a cat and mouse game.
Read MoreYour Guide to Sandboxing: What It Is, Its Benefits, and How You Can Use It to Protect Your Virtual Environment
Cyber threats are becoming more complex. Compared to their milder predecessors, they are now a more significant threat that affects millions worldwide. Nowadays, cyber threats are a legitimate cause for concern—when left unchecked, they can negatively affect your operations, finances, and even your reputation. Data breaches and hacking incidents have affected not only individuals but …
Read MoreWhat You Need to Know About Intrusion Detection Systems
The latest IBM Cost of a Data Breach report shows that the past year registered the highest data breach costs in the 17-year history of its reporting. Widely affected by remote work and compromised credentials, these costs were pegged at USD 4.24 million. This trend shows the massive impact of cyberattacks and threats to enterprises …
Continue reading “What You Need to Know About Intrusion Detection Systems”
Read MoreA Close Look at Endpoint Detection and Response
The growing dependency of many businesses on technology for important tasks opens a lot of opportunities for consumers, but it also opens doors to cyberattacks. The advanced technologies that have made life easy for us have also made it easy for unscrupulous minds to do their dirty work. The good news is that many companies …
Continue reading “A Close Look at Endpoint Detection and Response”
Read MoreSOAR: How It Works and How It Can Benefit Your Security Operations
Cyber security is a crucial aspect of operations. It refers to strategies and technologies that protect systems and data, including sensitive data, intellectual property, and personally identifiable information (PII), from security issues, such as theft, unauthorised use, and damage. Now, more than ever, the world is facing threats from security incidents. Cyberattacks are becoming more …
Continue reading “SOAR: How It Works and How It Can Benefit Your Security Operations”
Read MoreTailgating: Examples, Risks and Defence Tips
Cybercriminals are getting smarter with the passage of time. They’re finding new ways to exploit and gain access to business computer systems. One of their evolving tactics is social engineering, a technique that involves the manipulation of human behaviour. Hackers trick another person, so they can gain confidential, personal data that they can use for …
Continue reading “Tailgating: Examples, Risks and Defence Tips”
Read MoreSIEM: How It Works and Selection Tips
With one cyber-attack happening in Australia every eight minutes, there’s never been a more crucial time for organisational systems to adopt robust solutions for quickly identifying and responding to suspicious IT activity. Attackers only need to find one security loophole in a network of security devices to be able to halt the operations of a …
Continue reading “SIEM: How It Works and Selection Tips”
Read MoreUnderstanding Identity and Access Management
As businesses and commercial enterprises undergo extensive digital transformation, the importance of having a reliable identity management system in place should not be taken for granted. The move towards increased accessibility at various customer touchpoints and employee work hubs poses security risks. In some industries, identity and access management systems are mandatory and are required …
Continue reading “Understanding Identity and Access Management”
Read MoreCyber Security 101: Cyber Vulnerabilities and Attacks in the Digital Space
Nowadays, many organisations and companies have migrated their processes and systems to the digital space. Digital transformation has become a crucial part of scaling and managing businesses, and it has become almost impossible to go about daily work tasks without using a mobile device. Team members use their devices to connect and facilitate work, allowing …
Continue reading “Cyber Security 101: Cyber Vulnerabilities and Attacks in the Digital Space”
Read MoreCyber Security Incident Response Plan
What It Is, Why It’s Important, and How You Can Build One for Your Business Cyber security threats in Australia abound despite measures implemented by organisations and governmental authorities, such as the Australian Cyber Security Centre (ACSC), Defence Intelligence Organisation (DIO), and the Australian Criminal Intelligence Commission (ACIC). The ACSC’s Annual Cyber Threat Report for …
Continue reading “Cyber Security Incident Response Plan”
Read MoreWhat Is Phishing? Everything You Need to Know
Phishing is one of the most pervasive cybersecurity problems. Believe it or not, phishing attacks have been around since the early days of the internet. The first recorded phishing attempt was conducted by a group of hackers in the mid-1990s. They used the America Online service to steal log-in details and credit card information from …
Continue reading “What Is Phishing? Everything You Need to Know”
Read MoreWhat is Data Security? Everything You Need to Know About Data Security
Cyberattacks are an ever-present threat. Anyone can fall prey to cyberattacks, from small businesses to government agencies. During the 2020-2021 financial year, the Australian Cyber Security Centre (ACSC) received over 67.500 cybercrime reports, indicating an increase of around 13% compared to last year. This equates to one report every 8 minutes, with a large number …
Continue reading “What is Data Security? Everything You Need to Know About Data Security”
Read MoreThe State of Cloud Security and Issues to Watch Out For
Many companies have migrated to cloud-based technologies in the past year due to stiff competition and the high demand for business-critical applications to be accessible in the face of remote working. In Australia alone, 55% of businesses have incorporated paid cloud models into their budgets from 2019 to 2020. Figures indicated that the larger the …
Continue reading “The State of Cloud Security and Issues to Watch Out For”
Read MoreEverything You Need to Know About Malware Protection
Malware can affect and wreak havoc on your devices at any given time. It may have iterations and its effects may vary according to its form. Malware can be used to collect and expose sensitive personal information for purposes of identity theft. It can also be used to steal financial data. With malware attacks becoming …
Continue reading “Everything You Need to Know About Malware Protection”
Read MoreCybersecurity 101: Discovering the Ins and Outs of Ransomware and How to Avoid It
The digital era has optimised the way people communicate and work. Today, members of an organisation can conveniently share and access files and data from anywhere in the world. However, this also puts vital data at more risk of being accessed by unsavoury characters and being infected with malicious software. One such malicious software is …
Continue reading “Cybersecurity 101: Discovering the Ins and Outs of Ransomware and How to Avoid It”
Read MoreCybersecurity 101: All You Need to Know About Cybersquatting or Domain Squatting
Ever since the dawn of the digital age, websites have become a crucial part of many businesses. Consumers across the globe head to the Internet when they want to learn more about products and services. That’s why business owners use their websites to list all the information that potential customers may want to know. The …
Continue reading “Cybersecurity 101: All You Need to Know About Cybersquatting or Domain Squatting”
Read MoreWhy Good Database Security is Important
Around 36 billion records were compromised from January to September of 2020. Nearly a billion of those records were exposed during two breaches in the third quarter of the year. According to the same report, cybercriminals are still the main drivers behind these breaches. However, misconfigured databases and services are the key factors that continue …
Continue reading “Why Good Database Security is Important”
Read MoreMicrosoft Power Apps Misconfiguration Exposes 38 Million Personal Records
Microsoft Power Apps misconfiguration exposes 38 million personal records A highly common misconfiguration on Microsoft Power Apps was found to have led to the exposure of 38 million personal records containing information such as COVID-19 vaccination status and social security number (SSN). Microsoft Power Apps is an online platform that provides tools for developing low-code …
Continue reading “Microsoft Power Apps Misconfiguration Exposes 38 Million Personal Records”
Read MoreT-Mobile Confirms 48 Million Personal Records Breached in Cyberattack
T-Mobile confirms cyberattack compromising personal data of 48 million customers On August 15, a hacker claimed to have breached T-Mobile and stolen 106 GB of data containing the names, addresses, account login credentials, and social security numbers (SSN) belonging to 100 million customers. A sample dataset of 30 million driver’s licence numbers and SSNs were …
Continue reading “T-Mobile Confirms 48 Million Personal Records Breached in Cyberattack”
Read MoreCan AR Glasses Replace Smartphones?
Conan, the famous Japanese animation ‘Case Closed’ protagonist, is famous for wearing special glasses. These glasses not only track the location of criminals but also have infrared detection and magnification capabilities. Another famous animation Dragon Ball also features unusual glasses called ‘Scouts’. Characters wear scouts, measure the combat power of their opponents, and obtain information. …
Continue reading “Can AR Glasses Replace Smartphones?”
Read MoreCybersecurity Teams Explained
Most people have seen hackers or hacker groups portrayed in mainstream media and have a visual in mind of what they look like: malicious actors in dark rooms staring at a wall of screens and code. The same follows for a cybersecurity team – they’re not simply “fix-it” guys who come in to repair the …
Continue reading “Cybersecurity Teams Explained”
Read MoreItalian COVID-19 Vaccine Booking Portal Knocked Offline in Ransomware Attack
Italian COVID-19 vaccine booking portal knocked offline in ransomware attack Italy’s Lazio regional government issued a notification on August 1 stating that it had suffered the most serious cyberattack ever. Home to the nation’s capital Rome, Lazio is the second-most populous region of Italy. According to Lazio’s President, all IT systems, including servers for the …
Continue reading “Italian COVID-19 Vaccine Booking Portal Knocked Offline in Ransomware Attack”
Read More[Security Weekly] South African Trade and Logistics Halted Due to Ransomware Attack
South African trade and logistics halted due to critical ransomware attack South Africa is facing a nationwide delay in the transports of goods after its state-owned logistics firm Transnet suffered a critical ransomware attack on July 22. Transnet operates most of the country’s ports, railways, and pipelines. Transnet sent a notice to its customers stating …
Read More[Security Weekly] US Law Firm to Fortune 500 Companies Suffers Ransomware Attack and Data Breach
US law firm to Fortune 500 companies suffers ransomware attack and data breach Campbell Conroy & O’Neil, P.C, a US corporate law firm whose clients include some of the world’s biggest corporations, disclosed a ransomware attack incident that happened back in February, which may have led to the compromise of sensitive personal data. Some of …
Read More[Security Weekly] Fashion Retailer Guess Hit By Ransomware, Personal and Financial Data Compromised
Fashion retailer Guess hit by ransomware, personal and financial data compromised US-based fashion retailer Guess announced a data breach where the personal and financial data of more than 1,300 employees and contractors were compromised in a ransomware attack back in February. In a data breach notification letter sent to the Maine Attorney General, Guess disclosed …
Read More[Security Weekly] Kaseya Exploited by REvil for Supply-Chain Ransomware Attack, 1,500 Firms Breached
Kaseya exploited by REvil for supply-chain ransomware attack, 1,500 firms breached Kaseya–an IT management vendor that sells SaaS and on-premises software to managed service providers (MSP), who then use the software to provide IT management services to SMEs–became the entry point of the latest supply chain attack. On July 2, the REvil ransomware gang exploited …
Read More[Security Weekly] Microsoft’s Customer Support Tools Compromised by Nobelium
Microsoft’s customer support tools compromised by Nobelium for targeted attacks Microsoft officially announced that the Russian state-sponsored hacking group Nobelium, also known as APT29, had gained access to a customer support agent’s computer, leading to subsequent cyberattacks targeting Microsoft customers. A highly sophisticated hacking group, Nobelium is infamous for being behind the SolarWinds supply chain …
Continue reading “[Security Weekly] Microsoft’s Customer Support Tools Compromised by Nobelium”
Read More[Security Weekly] Carnival Cruises Disclose a Fourth Data Breach Over a Period of 15 Months
Carnival cruises disclose a fourth data breach over a period of 15 months Carnival Corporation & plc, the world’s largest travel company that operates some of the major cruise lines, disclosed another data breach incident that affected the Carnival Cruise Line, Holland America Line, and Princess Cruises, making it the fourth data breach incident the …
Read More[Security Weekly] VW and Audi Expose 3.3 Million Personal Records Due to Vendor Mistake
Volkswagen and Audi expose over 3.3 million personal records from North America Volkswagen and its subsidiary Audi announced that over 3.3 million personal records of their North American customers and potential buyers were accidentally exposed by an undisclosed third-party vendor. The vendor serves both companies and their authorized dealers in the United States and Canada. …
Read More[Security Weekly] Gaming Giant EA’s Source Code and Debug Tools Stolen from Cyberattack
Video game giant Electronic Arts suffers cyberattack compromising source code Electronic Arts (EA), one of the largest gaming companies in the world and the publisher of popular games like the FIFA series, Battlefield, and The Simpsons, suffered a cyberattack that compromised over 780 GB of data, mostly consisting of source code and debug tools. The …
Read More[Security Weekly] World’s Largest Meat Distributor JBS Shuts Down Operations After REvil Ransomware Attack
World’s largest meat distributor suspends operations after REvil ransomware attack
Read More