Anonymous Sudan’s Attack of European Investment Bank: Money, Politics and PR

Image: Adobe Stock/Sandsun Last week, Anonymous Sudan, identified by Flashpoint and others as a Russia-aligned threat actor spoofing an Islamicist hacktivist group, attacked another western financial institution. This time, it…

Continue ReadingAnonymous Sudan’s Attack of European Investment Bank: Money, Politics and PR

Okta vs. Duo (2023): Which IAM tool is best for your business?

Identity and access management solutions like Okta and Duo are extremely valuable for maintaining organizational data security. While both Okta and Duo offer strong identity management features like multifactor authentication,…

Continue ReadingOkta vs. Duo (2023): Which IAM tool is best for your business?

BBC, British Airways, Boots hit with hackers’ ultimatum after suffering MOVEit supply-chain attack

Image: SomYuZu/Adobe Stock British Airways, BBC and Boots have all been served an ultimatum after they were hit with a supply-chain attack by the ransomware group Clop. In a post…

Continue ReadingBBC, British Airways, Boots hit with hackers’ ultimatum after suffering MOVEit supply-chain attack

Cisco LIVE 2023: AI and security platforms innovations take center stage 

Image: Cisco Organizations worldwide are dealing with short-staffed security operations, and a security parasol that stitches together numerous single-point solutions and hampers threat visibility. At its LIVE 2023 event in…

Continue ReadingCisco LIVE 2023: AI and security platforms innovations take center stage 

Cybersecurity: Reducing cyber risk with next-gen technology

The attack surface within the cybersecurity landscape is ever expanding and gaining in complexity, meaning that today, the securing and tracking of sensitive data is of the utmost importance – perhaps more than ever before, Gideon Viljoen, Datacentrix Presales Specialist: ICT Security says.

Source of Article

Continue ReadingCybersecurity: Reducing cyber risk with next-gen technology

How business email compromise attacks emulate legitimate web services to lure clicks

New BEC cyberattacks use phishing with a legitimate Dropbox link as a lure for malware and credentials theft. Image: Adobe Stock. Threat actors have added a new wrinkle to traditional…

Continue ReadingHow business email compromise attacks emulate legitimate web services to lure clicks