Ukraine is building an 'IT army' of volunteers, something that's never been tried before

Ukraine has created what is describes as an “IT army” to defend against Russian hackers and to launch counter operations against cyber threats. Russia’s invasion of Ukraine has been accompanied…

How to Choose the Right Inventory Management Software

Inventory management software is a type of software that helps businesses keep track of the products they have in stock. It can help companies manage their inventory more efficiently, and…

How Can Businesses Digitalize Day-to-Day Operations for Better Productivity

Technology has changed the business landscape in ways that would have been unimaginable just two decades ago. Artificial intelligence, automation, and software have given business owners the opportunities to transform…

Ukraine asks cryptocurrency firms to block Russian users

Ukraine has requested major cryptocurrency exchanges restrict the activities of Russian account holders.   Mykhailo Fedorov, the Vice Prime Minister and Minister of Digital Transformation of Ukraine, tweeted the appeal on…

Analyzing Cyber and Influence Operations in the Russia-Ukraine Conflict

The Russian invasion of Ukraine represents a new type of warfare, including extensive cyber and information operations

Toyota Was Hit by Cyberattack

Japan’s Toyota Motor Corporation is a worldwide automobile manufacturer with its headquarters in Toyota City, Aichi Prefecture. Kiichiro Toyoda formed the company, which was officially established on August 28, 1937.…

New FoxBlade Malware Targeted Ukraine Hours Before Russia’s Attack, Microsoft Says

According to Microsoft, several hours before Russia invaded Ukraine on February 24th, the Eastern European country networks were targeted with newly discovered malware. The Microsoft Threat Intelligence Center (MSTIC) discovered…

Steps to Mitigate Potential Cybersecurity Consequences of the War in Ukraine

In the context where CISOs along with their European and global teams are or might be experiencing cybersecurity effects of the war in Ukraine, Forrester recommended some cybersecurity steps that…

This stealthy and 'most advanced' malware burrows deep into networks to steal data

Security researchers have uncovered a stealthy backdoor from a China-linked hacking group that is being used to target critical infrastructure in multiple countries.  The malware, dubbed Daxin by researchers at…

Microsoft Accounts Targeted by Russian-Themed Credential Harvesting

Malicious emails warning Microsoft users of “unusual sign-on activity” from Russia are looking to capitalizing on the Ukrainian crisis. While legitimate concerns abound about the Russian-Ukrainian conflict sparking a far-reaching…