Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Higher Education Needs to Prioritize Cybersecurity in 2024

The frequency and severity of cyber attacks has increased dramatically since 2020, and the trend looks to continue in 2024. For the last four years, the education sector has been among the top five industries targeted by criminals. In fact, a recent cybersecurity report noted that ransomware attacks affected 79 percent of higher education providers in 2023, up from 64% in 2022.

How to Better Manage Cybersecurity Risk With Human-Centric Approach

Threat detection is essential, as it serves to locate and minimize the threat as quickly and effectively as possible. However, some companies are starting to embrace an earlier line of defense that Gartner calls human-centric security. The tech research firm lists it as the number one cyber security trend of 2023 and has forecasted that 50% of CISOs will adopt this new approach by 2027.

Russian Hackers Win Big: Microsoft's Senior Exec Team Emails Breached

In a Friday regulatory filing, Microsoft has reported that its corporate email accounts were compromised by a Russian state-sponsored hacking group known as Midnight Blizzard, also identified as Nobelium or APT29. Microsoft's disclosure aligns with new U.S. requirements for reporting cybersecurity incidents. The attack was detected on January 12th, 2024, but it appears to have started in November 2023.

Fortifying Your Systems: 7 Essential Strategies for Enhanced Hardware Security

How do you reinforce hardware against unauthorised access and attacks? Implementing hardware security is critical, and understanding it helps protect enterprise systems at every level. In this blog, we explore seven fundamental strategies to shield your organisation from hardware-related threats.

The Role of Proxies in Enhancing Online Security and Privacy

Considering the interconnectivity of the world, online security and privacy have become paramount. As a result, individuals and businesses take their cyber hygiene seriously. Using web proxies is one way they employ to improve their online safety. However, not all proxies are the same. Paid proxies have advantages over free proxies. In this article, we cover the features of proxies, how paid proxies improve on free proxies, and suitable use cases of proxies.

Considerations for outsourcing your penetration testing

Penetration testing has become a cornerstone of robust cybersecurity strategy. It’s a critical process where experts simulate cyber attacks on your systems, networks, or applications to identify vulnerabilities before real attackers can exploit them. This proactive approach fortifies your defences and ensures compliance with various industry standards.

Two Zero-Day Vulnerabilities Exploited in Citrix NetScaler ADC and NetScaler Gateway

Two vulnerabilities have been detected in in Citrix NetScaler ADC and NetScaler Gateway. These vulnerabilities are being tracked as CVE-2023-6549 and CVE-2023-6548 with CVSS scores of 8.2 and 5.5 respectively. They are under active exploitation, affecting the following product versions.