Ransomware is now commonplace within many industries around the world. Over the past three years, especially during the pandemic, ransomware attacks have increased in many different sectors including government, healthcare, education, professional services, and manufacturing. According to the FBI’s Internet Crime Report 2021, America experienced an unprecedented increase in cyber-attacks and malicious cyber activity during 2021. These cyber-attacks compromised businesses … Read More
Importance of continuous control monitoring (CCM)
What is continuous control monitoring? Continuous control monitoring (CCM) is defined as using a set of technologies to reduce company losses through continuous monitoring. It also reduces the cost of audits via the continuous auditing of controls in financial applications and other types of applications. In the overall business ecosystem, CCM sits above your existing security tooling, ensuring that all assets … Read More
New Spring4Shell vulnerability: CVE-2022-22963 and CVE-2022-22965
Spring4Shell – a new zero-day vulnerability which affects Spring users It’s the second critical bug that has been identified on the application within a week. Spring is a widely used application framework and inversion of control container for the Java platform. Its core features can be used by any Java application which means a large number of users may have … Read More
Okta cyber attack: Supply chain attacks on the rise
Analysing Okta cyber attack and what you should do if your business has been affected Organisations that use Okta to provide access to their networks have been affected by a cyberattack conducted by the hacking group Lapsus$. Okta said that in a worst-case scenario, 366 of its clients had been compromised and their “data may have been viewed or acted … Read More
Mitigating cyberattacks with IOAs and IOCs
IOA and IOC – what’s the difference and why you should pay attention to them Being able to mitigate cyberattacks is key to business success in today’s digital age. Indicator of Attack (IOAs) and Indicator of Compromise (IOCs) are two important parts of ensuring your network is safe and secure. IOAs demonstrate the intentions behind a cyberattack and the techniques … Read More
The Rise of Ransomware as a Service
Ransomware as a service – what is it and how to prevent it? Ransomware attacks have more than doubled in the last 12-months alone. It’s a scary statistic that sends shudders down the spines of security teams around the world who are constantly battling cyber threats. But just why has ransomware become the weapon of choice for cyber attackers? The … Read More
Breaking down new SEC rules on cybersecurity risk management
What are the new SEC rules on cybersecurity risk management disclosure? The Securities and Exchange Commission (SEC) has introduced new rules to enhance and standardise disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting by public companies. According to the SEC rules on cybersecurity, proposed amendments to already existing rules would require, among other things, current reporting about material … Read More
Top 3 Ransomware Examples and what can we learn from them
Ransomware attacks have become a significant threat to businesses worldwide. As organisations adopt remote working models to accommodate WFH, they expose networks to ransomware, creating devastating losses that undermine their reputations. In fact, the past year has seen ransomware attacks take down massive corporations with sophisticated networks. We will explore some ransomware examples and explain what to do to prevent such … Read More
Why a Cybersecurity Posture Assessment is a must?
Why you should assess you cybersecurity posture? As enterprises move to the cloud, tens and thousands of assets are being migrated to cloud storage servers. In fact, according to a recent study, 61% of companies made the switch to the cloud in 2021 alone. While cloud technology improves collaboration and streamlines data accessibility, having critical digital assets stored online has … Read More