Today’s subscription economy makes accessing nearly any service as easy as hitting enter. The same model has now entered the dark web. The same Netflix-style instant-access menu is now part and parcel of the online criminal’s lifestyle. Ransomware-as-a-Service (Raas) is opening up the hacking talent pool, giving amateurs access to sophisticated ransomware toolkits – a […]
Following the news that: Uber is hiring for over 80 cybersecurity jobs after being hacked last week Uber is hiring for over 80 cybersecurity jobs after being hacked last week (msn.com)
It has been announced that Morgan Stanley has agreed to pay a $35 million penalty for data security lapses that included unencrypted hard drives from decommissioned data centres being resold on auction sites without first being wiped.
It has been reported that millions of Australians have had their personal details compromised in a major cyberattack on Optus. The telco confirmed the data breach in a statement on Thursday afternoon, revealing up to 9 million Australians could be affected.
Due to a glitch by anti-malware software company, Malwarebytes, it began yesterday detecting Google and YouTube domains as being malicious and therefore blocking its users from accessing the website homepage as well as the features that are used alongside it.
While quantum has become a big buzzword, the security implications are still very real. Cybersecurity leaders are very concerned by “harvest now, decrypt later” report finds. Quantum computers, once viable, will render existing encryption (cryptographic algorithms) redundant. This means that organisations must transfer to quantum-safe algorithms immediately to ensure they are ready in time!
As reported by Bleeping Computer, Twitter logged out some users after addressing a bug where some Twitter accounts remained logged on some mobile devices after voluntary password resets. “That means that if you proactively changed your password on one device, but still had an open session on another device, that session may not have been […]
Organisations Need To Adopt Predictive And Proactive Threat Detection Software To Counter Cyber-attacks
As technology evolves, we often think of the benefits it can brings to organisations with new software and programmes being created to enhance society as a whole. But we often overlook the fact that these new, innovative products and systems are also available to those who want to do harm – specifically cyber criminals. In […]
Okta’s global State of Secure Identity Report has found that credential stuffing is the top threat against customer accounts, outpacing legitimate login traffic in some countries. The report presents trends, examples and observations unearthed from the billions of authentications on Okta’s Auth0 platform. Credential stuffing is when attacks take advantage of the practice of password […]