LATEST IN

Expert Comments
Hackers Using Bumblebee Loader To Compromise Active Directory Services
The malware loader known as Bumblebee is being increasingly co-opted by threat actors associated with BazarLoader, TrickBot, and IcedID in their campaigns to breach target
ISBuzz Staff
August 19, 2022
Apple Security Flaw Actively Exploited By Hackers
August 19, 2022
Tech Industry Leaders React To A Level Results
August 19, 2022
2022 OT Attack Vectors – Phishing, Scanning & Brute Force
August 18, 2022

Security Articles
Creating A Culture Of Cybersecurity
Cybersecurity is a top priority for all organisations, but any system will only be as strong as the people who
Julien Escribe

Security Articles

Six Ways Of Safeguarding Employee Workstations
Hybrid work was, up until recently, billed as the future. However, post-Covid it has quickly been embraced by organisations and
David Higgins

Security Articles

Establishing Trust In An Online World With Digital Identity
Identity fraud remains a key threat and the number of cases recorded grew by 22% in 2021, accounting for 63%
philipp.pointner

Hackers Using Bumblebee Loader To Compromise Active Directory Services
The malware loader known as Bumblebee is being increasingly co-opted by threat actors associated with BazarLoader, TrickBot, and IcedID in
- By: ISBuzz Staff
- Date: August 19, 2022

New PyPi Malware Pkgs Steal Discord And Roblox Credential & Payment Info, Expert Weighs In
A dozen malicious PyPi packages have been discovered by researchers at Snyk installing malware that modify the Discord client to
- By: ISBuzz Staff
- Date: August 19, 2022

Apple Security Flaw Actively Exploited By Hackers
Apple has disclosed serious security vulnerabilities for iPhones, iPads and Macs, which could potentially allow attackers to take complete control
- By: ISBuzz Staff
- Date: August 19, 2022

Tech Industry Leaders React To A Level Results
A-Level Results 2022 – Tech industry experts react This week A-Level students received their results, with many of them now
- By: ISBuzz Staff
- Date: August 19, 2022

Expert On Report Showing 297% Increase In US Breaches Tied To Supply Chain And Third-party Suppliers
It has been reported that a report from ForgeRock has revealed an unprecedented 297% surge in breaches caused primarily by security
- By: ISBuzz Staff
- Date: August 18, 2022

2022 OT Attack Vectors – Phishing, Scanning & Brute Force
New data released by IBM X-Force on operational technology (OT) vulnerabilities confirmed the OT cyber threat landscape is expanding dramatically
- By: ISBuzz Staff
- Date: August 18, 2022

Signal / Twilio Incident – How Secure Are SMS Verifications? Experts Weigh In
Signal, often considered one of the most secure messaging app, was recently affected by a phishing attack suffered by Twilio,
- By: ISBuzz Staff
- Date: August 18, 2022

Criminals Are Posting Counterfeit Microsoft Products To Get Access To Victims’ Computers, Expert Weighs In
As reported by Sky News, Microsoft has confirmed that scammers have began a campaign posting counterfeit packages designed to look
- By: ISBuzz Staff
- Date: August 18, 2022

Open Source U.K. Government Websites Are Vulnerable
According to TechMonitor, hundreds of thousands of websites, including some with UK government domains, that use the open source development
- By: ISBuzz Staff
- Date: August 18, 2022

Research And Expert Comments On TA558 Targeting Hospitality.
Cybersecurity researchers at Proofpoint have today published new threat intelligence detailing how cybercriminal group TA558 has been targeting hospitality, hotel,
- By: ISBuzz Staff
- Date: August 18, 2022

North Korean Threat Group Lazarus Up To Old Tricks With New Malware Attack Targeting Mac OS Systems
The news broke that ESET researchers have identified a new cyberespionage campaign by North Korean APT group Lazarus, targeting Apple
- By: ISBuzz Staff
- Date: August 18, 2022

Creating A Culture Of Cybersecurity
Cybersecurity is a top priority for all organisations, but any system will only be as strong as the people who
- By: Julien Escribe
- Date: August 17, 2022

UK Water Suppliers Hacked But Hackers Extort Wrong Victim
Hackers attack UK water supplier but extort wrong victim. The Clop ransomware gang claimed to have breach Thames Water supplier
- By: ISBuzz Staff
- Date: August 17, 2022

Expert Commentary: Thousands Of Exposed VNC Instances Exposed
As you may have heard, 8,000 internet-accessible VNC instances were exposed due to disabled authentication. Security researchers found that these
- By: ISBuzz Staff
- Date: August 17, 2022

Irdeto And Clavister To Bring Enhanced Security To The Connected Transport Industry
Irdeto’s Connected Transport business will partner with Clavister to combine Clavister’s Next Generation Firewall (NGFW) solution and AI engine for
- By: ISBuzz Staff
- Date: August 17, 2022

Squish The Phish: Teaching Your Staff About Cyber Security To Slash Phishing Attacks, Experts Weigh In
Phishing is a huge threat that affects so many industries every year. Some industries were hit particularly hard, with retail workers
- By: ISBuzz Staff
- Date: August 17, 2022

Over 8,000 Exposed VNC Ports – Major Threat To Critical Infrastructure
Researchers at Cyble discovered over 8,000 exposed VNC (virtual network computing) endpoints that allow access to networks without authentication. VNC is a graphical
- By: ISBuzz Staff
- Date: August 16, 2022

The “Cyber Insurance Gap” Is Threatening Most Companies
A new study by BlackBerry and Corvus Insurance confirms a “cyber insurance gap” is growing, with a majority of businesses
- By: ISBuzz Staff
- Date: August 16, 2022