Defense Electronics Manufacturer Ends Up Paying $500,000 To Cybercriminals!!

One of the Digital Guardian’s Blog stated that in the year 2017 the FBI’s Internet Crime Complaint Centre (IC3) received 1783 ransomware complaints that cost victims over $2.3 million. Along with it, there were an estimated 184 million ransomware attacks that took place last year. Talking about a recent ransomware attack, in mid-January Communications and …

Defense Electronics Manufacturer Ends Up Paying $500,000 To Cybercriminals!! Read More »

Cyble included in the latest Cybersecurity Observatory — APAC and Australia editions

The latest Cybersecurity Observatory — APAC and Australia editions are now ready for download. Cyble Inc. is excited to be a part of these reports. Link (APAC) –https://cyberstartupobservatory.com/cybersecurity-landscape-slide-apac/ Link (AU) –https://cyberstartupobservatory.com/cybersecurity-landscape-slide-australia/ #cyble #cyber #amibreached About Cyble: Cyble Inc.’s mission is to provide organizations with a real-time view of their supply chain cyber threats and risks. Their SaaS-based solution powered by machine …

Cyble included in the latest Cybersecurity Observatory — APAC and Australia editions Read More »

Multi-Factor Authentication (MFA) is a part of your Cyber Hygiene

If we talk about the terminology “security”, then we can say that no company is 100% secure or even close to it. Just recently last week at the RSA security conference, it was mentioned that 99.9% of the Microsoft enterprise accounts that were being compromised by the cybercriminals lacks Multi-Factor Authentication (MFA). Microsoft itself stated …

Multi-Factor Authentication (MFA) is a part of your Cyber Hygiene Read More »

Supply Chain Cyber Risk Management — Why Current Practices are Doomed

Supply chain security risks can pose threats in different ways, with some scenarios more dangerous than the others. For larger companies, protecting the data of their customers is the foremost priority because they are very well aware of the threat to their services emanating from these cybersecurity risks. The access point for this cyber-attack that …

Supply Chain Cyber Risk Management — Why Current Practices are Doomed Read More »

OT Security Good Practices

The increasingly interconnected nature of today’s OT systems, especially in critical infrastructure industries such as electricity, water, oil and gas, transportation, chemical, and healthcare use for automated process control, combined with threat actors interest in compromising them for economic and non-economic purposes such as political, has made these systems more vulnerable to external compromise or …

OT Security Good Practices Read More »

Scroll to Top