Who is targeted by ransomware? 

Who is targeted by ransomware

Ransomware is now commonplace within many industries around the world. Over the past three years, especially during the pandemic, ransomware attacks have increased in many different sectors including government, healthcare, education, professional services, and manufacturing.  According to the FBI’s Internet Crime Report 2021, America experienced an unprecedented increase in cyber-attacks and malicious cyber activity during 2021. These cyber-attacks compromised businesses … Read More

New Spring4Shell vulnerability: CVE-2022-22963 and CVE-2022-22965

New Spring4Shell vulnerability CVE-2022-22963 and CVE-2022-22965

Spring4Shell – a new zero-day vulnerability which affects Spring users It’s the second critical bug that has been identified on the application within a week. Spring is a widely used application framework and inversion of control container for the Java platform. Its core features can be used by any Java application which means a large number of users may have … Read More

Okta cyber attack: Supply chain attacks on the rise

Okta cyber attack: cloud security Supply chain attacks

Analysing Okta cyber attack and what you should do if your business has been affected Organisations that use Okta to provide access to their networks have been affected by a cyberattack conducted by the hacking group Lapsus$. Okta said that in a worst-case scenario, 366 of its clients had been compromised and their “data may have been viewed or acted … Read More

Top 3 Ransomware Examples and what can we learn from them

Top 3 Ransomware Examples and what can we learn from them

Ransomware attacks have become a significant threat to businesses worldwide. As organisations adopt remote working models to accommodate WFH, they expose networks to ransomware, creating devastating losses that undermine their reputations.  In fact, the past year has seen ransomware attacks take down massive corporations with sophisticated networks. We will explore some ransomware examples and explain what to do to prevent such … Read More

Understanding the cyber risks of the LDAP protocol

Understanding the cyber risks of the LDAP protocol

The Lightweight Directory Access Protocol (LDAP protocol) is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network.  LDAP is a client-based lightweight version of Directory Access Protocol (DAP). It operates on both private intranets and public networks, and across multiple directory services which makes it the most convenient for authenticating, … Read More

Why a Cybersecurity Posture Assessment is a must?

Why conduct a Cybersecurity Posture Assessment

Why you should assess you cybersecurity posture? As enterprises move to the cloud, tens and thousands of assets are being migrated to cloud storage servers. In fact, according to a recent study, 61% of companies made the switch to the cloud in 2021 alone.  While cloud technology improves collaboration and streamlines data accessibility, having critical digital assets stored online has … Read More

How to use NIST SP 800-61 guide to be better prepared for third-party risk

How to use NIST SP 800-61 guide for third-party risk?

As your business grows, so does its third-party ecosystem. But with growth comes a greater sense of responsibility which entails increasing cybersecurity measures and protecting your company against cyberattacks. Ensuring your organisation’s cyber defences are at an optimal level is paramount in today’s digital age to protect against technology outages, credential and data exposures, denial-of-service attacks, ransomware, and other threats. Here … Read More

Why is the number of cyber attacks during holidays growing?

RiskXchange Why are cyber risks on the rise during the holiday season RiskXchange The leader in Third-Party Cyber Risk Management

As the holiday season draws closer, the retail and logistics industry can expect a significant increase in activity and revenue as customers flock to websites and physical stores to complete their shopping. But so does increase the risk of cyber attacks during holidays. Studies show that holiday shopping in 2021 will grow by 8.1% in sales, marking a significant rise … Read More

Cyber supply chain risk management (C-SCRM) best practices for 2022

RiskXchange Cyber supply chain risk management C SCRM best practices for 2022 RiskXchange The leader in Third-Party Cyber Risk Management

RiskXchange fights cyber threats by providing instant risk ratings for any company across the globe. Cyber supply chain risk management (C-SCRM) is the process of identifying, understanding, and mitigating cyber risks that threaten your organisation’s extended supply chain. Managing cyber risk within your supply chain includes taking precautionary measures to secure your organisation against attacks, as well as mitigating the … Read More