Breach

Ransomware Rising – Understanding, Preventing and Surviving Cyber Extortion
Over the past 6 months I have been researching ransomware, and not even from the technical angle (which would very tempting and no doubt, enlightening in it’s own right), but from a ...
Leveraging Infostealers to Breach Companies: A Cybersecurity Intelligence Perspective
Infostealers are specialized malware designed to extract sensitive data from infected systems. They operate in the background, collecting login credentials, browser histories, and cookies, often without detection. Deployed through phishing emails or ...

How Data Breaches Empower Malicious AI: The AT&T Case Study
Once a model is trained on a data set, if you delete that data set, the model still retains the knowledge derived from that data. The impact of the breach lives on, ...

The Ticketmaster Breach – A Never Ending Saga
The Ticketmaster Saga continues, with over 500 Million users personal and financial details compromised. When will we stop playing whack-a-mole and start taking Personal Data Privacy seriously? ...

Human Vigilance is Required Amid AI-Generated Cybersecurity Threats
While many organizations are adopting AI at an alarming pace to gain efficiencies and lower operating costs through technology and headcount reduction, they may also be sacrificing their security ...

The Ever Expanding Attack Surface
Everything, these days, is connected. The fridge, the oven, your fitness tracker, your thermostat, the locks on your front door… It’s the same for businesses as well as at home. Everything is ...

The Urgency to Uplevel AppSec: Securing Your Organization’s Vulnerable Building Blocks
Let’s examine why so many applications remain vulnerable despite high-severity warnings and how to minimize the threat to your organization ...

Cloud Security Tops Priority List for Organizations Globally
Cloud security has become a major focus for organizations worldwide as they battle with a growing number of data breaches and application sprawl that makes defense more complicated ...
The Data Privacy Revolution
In an era where data breaches, ransomware, and other cyber threats are becoming increasingly sophisticated, traditional methods of protecting data, PII, and other sensitive details are proving inadequate. Decades ago, neither HTTP ...

From a Snowflake to a Snowball: How to Detect and Stop Impersonation Attacks
Migrating to the cloud is a lot more than just "lift and shift". It requires cross-organizational adaptation, and a comprehensive view - from left to right. The post From a Snowflake to ...