FOI Request Reveals Scale of Data Breaches at UK Councils

FOI Request Reveals Scale of Data Breaches at UK Councils UK councils have been hit by a staggering 33,645 data breaches caused by human error in the past five years,…

What Is Conti Ransomware?

Conti ransomware is an extremely damaging malicious actor due to the speed with which encrypts data and spreads to other systems. The cyber-crime action is thought to be led by…

All You Need to Know About DNS Spoofing to Keep Your Organization Safe

This post is also available in: Danish The DNS in and of itself has never been secure. Being created in the 1980s when the Internet was a complete novelty, protection…

My Health Record imaging services security failed ADHA password standards

My Health Record system’s physical and information security measures used to access the My Health Record system for pathology and diagnostic imaging services did not meet the ADHA’s recommended standard…

Windows Defender Is an Underutilized Endpoint Security Resource

Microsoft Defender Antivirus suffers from a perception problem. For the first decade of its existence, starting with its 2006 release, Defender was a much-maligned piece of software that no business…

Acer Hit Twice in One Week by the Same Hacker

Threat actors identified as ‘Desorden’ claimed they had hacked Acer India’s computers and stolen data, including client information. What Happened? Acer reacted in a press release saying this was an…

Duckduckgo vs Google: A Security Comparison and How to Maximize Your Privacy

Are you preoccupied with privacy? You’ve come to the right place. In today’s guide, I’ll go through everything you should know about Duckduckgo vs Google, how each of them works…

Halloween comes early for Syniverse, Facebook, and Twitch: What we can learn from their spooky outages plus breaches

It looks like more than ghosts are wreaking havoc on haunted networks. We’re less than a full week into October, and Cybersecurity Awareness Month isn’t quite taking shape the way…

How using the purple team approach helps in addressing cybercrime

Automated purple teaming is one of the best ways to address cybercrime as it does not only test for the deficiencies in existing security controls – Let’s dig deeper into…

Multi-Factor Authentication (MFA) and Other Cybersecurity Must-haves

Building up a robust security department and having a strong security posture doesn’t happen overnight. Between ever-evolving threats, new vulnerabilities, increasing attack surfaces, and resource management, a cybersecurity leader has…