Attack

How Does Coinbase Combat Cyber Threats Without Paying Ransom?
Identity & Access Management How Does Coinbase Combat Cyber Threats Without Paying Ransom?

In today's digital age, the rise of cryptocurrency has simultaneously paved the way for a new wave of complex cyber threats. These threats often target both financial institutions and their customers, aiming to exploit vulnerabilities for financial gain. Recently, Coinbase, a leading

Is Your TPRM Strategy Ready for Modern Risk Challenges?
Malware & Threats Is Your TPRM Strategy Ready for Modern Risk Challenges?

Rupert Marais is recognized for his extensive expertise in cybersecurity strategies and network management. As our in-house Security specialist, he offers crucial insights into the evolving landscape of third-party risk management. The conversation delves into the key findings from a recent EY

Can Financial Firms Handle Escalating Cyber Threats?
Data Protection & Privacy Can Financial Firms Handle Escalating Cyber Threats?

In recent years, cyber threats have become an ever-growing concern for the financial sector, with incidents such as the one experienced by Insight Partners serving as a stark reminder. This private equity and venture capital firm, with investments in over 800 companies and regulatory assets

Is Deutsche Bank Ignoring Severe Security Breaches?
Infrastructure & Network Security Is Deutsche Bank Ignoring Severe Security Breaches?

Deutsche Bank's recent security breach at its New York data center has sparked significant concerns about the institution’s internal safeguards and accountability measures. This issue came to light through a lawsuit filed by James Papa, a former manager at Computacenter. The lawsuit alleges t

Can Cyber Defenders Outpace Evolving EDR Bypass Attacks?
Data Protection & Privacy Can Cyber Defenders Outpace Evolving EDR Bypass Attacks?

A novel technique called "Bring Your Own Installer" (BYOI) has emerged to bypass Endpoint Detection and Response (EDR) protections, specifically targeting SentinelOne's tamper protection. This method enables cybercriminals to disable EDR agents, paving the way for deploying

Black Kingdom Ransomware – A Review
Malware & Threats Black Kingdom Ransomware – A Review

The world of cybersecurity faces relentless threats from increasingly sophisticated ransomware attacks, with the Black Kingdom ransomware emerging as a prominent and dangerous adversary. This malevolent software gained notoriety by targeting Microsoft Exchange servers, illustrating a significant

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later