India Releases Cybersecurity Guidelines for Power Sector

Trend Micro – Trend Micro – The Indian Government’s Power Ministry and the Central Electricity Authority (CEA) recently released cybersecurity guidelines to enhance the power sector’s cybersecurity readiness. It is…

Gummy Browsers: The New Cyberattack Developed by Researchers

Academic experts from a U.S. university designed a new type of cyberattack dubbed Gummy Browsers. Its main characteristics include the capturing of fingerprints and also tricking the browser. Gummy Browsers…

Threat Actors Abusing Discord to Spread Malware

Threat Actors Abusing Discord to Spread Malware Researchers have discovered new multi-function malware abusing the core functions of popular group app platform Discord. Check Point explained in a blog post…

Geriatric Microsoft Bug Exploited by APT Using Commodity RATs

Disguised as an IT firm, the APT is hitting targets in Afghanistan & India, exploiting a 20-year-old+ Microsoft Office bug that’s as potent as it is ancient. An APT described…

What Is Privileged Account and Session Management (PASM)?

Privileged Account and Session Management (PASM) is a new PAM (Privileged Access Management) that focuses on privileged account monitoring and management for compliance, security, and data integrity purposes. Whereas PAM…

Halloween comes early for Syniverse, Facebook, and Twitch: What we can learn from their spooky outages plus breaches

It looks like more than ghosts are wreaking havoc on haunted networks. We’re less than a full week into October, and Cybersecurity Awareness Month isn’t quite taking shape the way…

FCC mulls over new rules demanding carriers block spam robot texts at network level

The US Federal Communications Commission (FCC) is due to consider a new proposal to clamp down on robot texts. On October 18, FCC Acting Chairwoman Jessica Rosenworcel unveiled a new…

Robots for kids: Best STEM kits and other tech gifts for hackers of all ages

All the signs were there. If my parents knew then what parents know now, they would have been prepared. But back in the 1960s and 1970s, the maker movement was…

Multi-Factor Authentication (MFA) and Other Cybersecurity Must-haves

Building up a robust security department and having a strong security posture doesn’t happen overnight. Between ever-evolving threats, new vulnerabilities, increasing attack surfaces, and resource management, a cybersecurity leader has…

Staggering growth of cybercrime and how data science helps improve online security

Did you know if you were to compare the money generated by cybercrime with the GDP of world nations, it would come third behind the economic powerhouses of America and…