Security terminology demystified: ransomware edition

Security terminology demystified: ransomware edition

The file scrambler, the data hoarder and the ransom demander – ransomware isn’t fun for anyone. You’ve read our comprehensive guide to cybersecurity threats and you’ve hopefully read our inside guide to malware but now it is time to delve deep into the underground...

SneakyPastes: hits Middle East related targets in 39 countries

In 2018, the Gaza Cybergang, now known to comprise several groups of varying sophistication, launched a cyberespionage operation targeting individuals and organisations with a Middle-Eastern political interest. The campaign, named SneakyPastes, made use of disposable...

Intentionally insecure: poor security practices in the cloud

So far this year, there have been five documented cases of organisations exposing their private data due to misconfigured S3 buckets or cloud databases. By Lori MacVittie, principal threat evangelist at F5 Networks Wait, let’s fix that: due to intentionally...

Autonomous IT, security solutions enable proactive IT

The cybersecurity of a business is still largely reliant on the people within each company’s IT department. This is not sustainable long-term and organisations need to start looking to autonomous security measures to relieve some of the pressure felt by IT...

Securing the Industrial Internet of Things

The very benefits that makes the Industrial Internet of Things (IIoT) so compelling, makes it equally capable of damaging infrastructure operations and processes through bad actors. Beginning with the Industrial Revolution in the mid 1700s, the manufacturing industry...

Assessing impacts: the meteors of security and AI

A 2018 study found that the illicit proceeds of global cybercrime had reached $1,5-trillion annually. Norton Security estimated that by 2023, a total of 33 billion records would be stolen each year. Internet of Things (IoT) attacks increased by 600% and Microsoft...