Cybersecurity

Cybersecurity Threats & Attacks

Given the sophistication of cyber-attacks, cybersecurity has become a central focus to protect people and their personal data. Learn more about the common cyber threats we all face in an age when companies are undergoing a digital transformation.

Top news of the week: 20.01.2023.

Cybersecurity in 2023: Russian escalation, Chinese espionage, Iranian “hacktivism”

Cybersecurity in 2023: Russian escalation, Chinese espionage, Iranian “hacktivism”

What can we learn from the past 12 months as we look ahead at the trends that will shape the threat landscape and cybersecurity in 2023?

Russia-Ukraine war influenced hacktivists use more destructive tactics

Russia-Ukraine war influenced hacktivists use more destructive tactics

Nozomi Networks reported that wiper malware, IoT botnet activity, and the Russia-Ukraine war significantly influenced the threat landscape last year.

December 2022 Cyber Attacks Statistics

December 2022 Cyber Attacks Statistics

After the cyber attacks timelines, it’s time to publish the statistics of December 2022 where I have collected and analyzed...

Microsoft expands availability of Azure OpenAI Service

Microsoft expands availability of Azure OpenAI Service

Microsoft announced that it’s expanding the general availability of Azure OpenAI, which allows more businesses to apply for access to AI models such as GPT-3.5, Codex and DALL•E 2. 

Website of Canadian Liquor Distributor LCBO Infected With Web Skimmer

Website of Canadian Liquor Distributor LCBO Infected With Web Skimmer

Canadian liquor distributor LCBO says online store’s user data was stolen following a web skimmer infection.

Authorities dismantle crypto exchange Bitzlato, allege it was cybercrime “haven”

Authorities dismantle crypto exchange Bitzlato, allege it was cybercrime “haven”

Criminal groups served allegedly include Conti, DarkSide, Phobos, and Hydra.

Initial Access Brokers How They’re Changing Cybercrime

Initial Access Brokers How They’re Changing Cybercrime

Initial Access Brokers are helping threat actors like RaaS groups streamline their attacks. Here's how organizations can defend against IABs.

Compete to Defend Against Every Type of Attack in a High-Pressure Simulation Using VMware Security Products

Compete to Defend Against Every Type of Attack in a High-Pressure Simulation Using VMware Security Products

What exactly is the Threat Hunter Challenge (THC)? THC is a game that’ll put you in real cyber-attack situations. It’ll get your brain spinning, your forehead sweating, and your ...