Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

Oakland declares a state of emergency over ransomware attack

The city government of Oakland has declared a state of emergency after it was hit by a ransomware attack. The attack, which began in the evening of February 8th, has forced the city to take all its IT systems offline, and has affected many non-emergency services, including the ability to collect payments, issue permits, and process reports.

What Is Business Profile Hijacking & How You Can Protect Your Business

Search engines automatically create a business listing based on publicly available information, but they permit business owners to override this automatic listing by publishing their own. This listing may include business hours, slogan, geographical location, a website link, contact information, reviews, and images. Business owners are also permitted to respond to reviews. Recently, Sedara has seen incidents in which the attacker claims control over a business listing that they do not own.

Cybercrime as a Service: A Subscription-based Model in The Wrong Hands

Arguably nothing in tech has changes the landscape more than ‘as a Service’ offerings, the subscription-based IT service delivery model, In fact, the ‘as a Service’ offering has made its way into the cybercrime landscape. And cybercrime, for its part, has evolved beyond a nefarious hobby — today it’s a means of earning for cybercriminals.

How to protect organizations against Brute Force Attacks

A brute force attack is an attempt to reveal passwords and login credentials in order to gain access to network resources. These attacks are mainly done with the purpose of gaining unauthorized, and undetected access to compromise systems. Threat actors usually prefer this attack method since it is simple to carry out, and can cause significant damage. Once a person’s credentials are revealed, the attacker can log in, generally unnoticed.

Security Control Types for Attack Surface Reduction

Cybersecurity is an ever-present concern for businesses, particularly as the modern attack surface continuously expands and changes due to the shift to remote work in response to the COVID-19 pandemic, cloud adoption, and the growth of shadow IT, among other factors. Implementing the appropriate security control types for attack surface reduction is crucial for bolstering your company’s cybersecurity posture in the modern threat landscape.

Social Engineering Attacks: The 4 Stage Lifecycle & Common Techniques

When it comes to high profile cybercrime incidents, it’s the major tech vulnerabilities and sophisticated state-sponsored threat vectors that make the headlines. In reality, however, most of the cybercrime incidents exploit the human element as the weakest link in the cyberattack kill chain.

Five worthy reads: Why should we worry about cyberwarfare in 2023?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll explain why cyberwarfare could be a potential cyberthreat in 2023. Cyberwarfare was one of the top trending terms in 2022, and the incidents that happened last year have opened up more discussions regarding this topic. Most people think cyberwarfare is synonymous with the term cyberwar.