cyber attack
Enhancing your security operations center through AI integration
April 04 by CSHub.com Editorial StaffExplore the integration of AI in enhancing security operations, the pivotal role of AI in modernizing your SOC and the pragmatic solutions to the challenges of AI adoption in cyber security operations
Enhancing cyber security in financial services: Simulated cyber attacks
March 27 by Nick BensonCREST’s Nick Benson examines whether financial regulators are doing enough to set mandatory minimum standards for complex, unpredictable and critical intelligence-led cyber attacks
Building a robust cyber security workforce
March 05 by Andrew CollinsonAs the digital landscape evolves, the need for a bigger, more inclusive cyber security workforce becomes increasingly pronounced
A guide to anti-drone systems: Protecting against evil aerial intruders
January 09 by Alex VakulovIn the hands of skilled attackers, drones can become a significant threat to tech industries, infrastructure and SMBs
IOTW: Victoria Court recordings exposed in suspected ransomware attack
January 05 by Michael HillUnauthorized access disrupted audio visual in-court technology network impacting video recordings, audio recordings and transcription services
How to build an effective cyber attack response plan
December 27 by James BoreA cyber attack response plan should provide straightforward steps to follow in the event of an incident
IOTW: Xfinity data breach impacts 35 million customers
December 22 by Michael HillExposed data includes usernames, hashed passwords and social security numbers
How ransomware extortion is evolving
December 18 by Michael HillDr Jason Nurse reflects on the changing ransomware extortion landscape and the threat it poses to businesses
IOTW: Russia-linked cyber attack targets Ukraine’s biggest phone operator
December 15 by Michael HillPowerful attack knocked out internet access and mobile communications, damaging IT infrastructure
IOTW: HTC confirms cyber attack as BlackCat ransomware gang teases stolen data
December 08 by Michael HillBlackCat/ALPHV ransomware group leaked photos of what appears to be stolen passports, contact lists, emails and confidential documents
Russian FSB accused of spear-phishing campaign against UK, US and allies
December 08 by Michael HillStar Blizzard has targeted academia, defense, governmental organizations and politicians with spear phishing campaigns
How to prepare for post-quantum cryptography migration
December 07 by Michael HillProfessor Alan Woodward discusses the importance of post-quantum cryptography and transitioning to quantum-resistant encryption