Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Build organizational resiliency with Microsoft's Chief Security Advisor

Major incidents like cyber attacks, terrorism, and pandemics are likely in the making right now but it doesn’t mean they’re inevitable. Learning from past incidents, asking the hard ‘what ifs’, and helping businesses build organizational resilience is always top of mind for security leader Sarah Armstrong-Smith.

Quantum Computing: A Revolutionary Leap in Technology and Privacy

Quantum computing might sound alien and strange - but it’s a revolutionary new technology. It’s a novel way to calculate using the principles of fundamental physics and to find solutions to very complicated problems very quickly. We have come a long way since the abacus; now, almost all of our complex calculations are done with digital computers. Looking to the future, quantum computers are ready to take us to another dimension of computing.

Protect yourself against digital draculas this Halloween: Avoid AI-driven cyber trickery

As Cybersecurity Awareness Month winds down and you prepare for Halloween festivities like trick-or-treating and pumpkin carving, don't forget to protect against real-world monsters: artificial intelligence-driven cyber threats. Here are a few steps that may help ward off such threats like garlic protects against Dracula: Taking precautionary steps against them may keep the real monsters at bay!

Birds of a Feather: Collaboration and Sharing within the Exclusive ThreatQ Community

Over the past decade, ThreatQuotient has dedicated itself to the task of transforming obscure digital threat data into actionable intelligence. Throughout this period, we’ve earned the trust of our partners and customers, forging strong relationships with each of them. Each team we’ve encountered in the field has brought unique insights, skill sets, perspectives, and ideas, significantly influencing our approach and perception of the ever-evolving threat landscape.

October Release Rollup: Egnyte Document Room, E2E Connector, Co-editable Links for Google Files and more

This month's release rollup includes product updates and enhancements from Egnyte such as the introduction of the Egnyte Document Room, E2E Connector, and Co-editable links for Google files. Below is a summary of these and other new releases. Visit the linked articles for more details. ‍ Featured Platform Enhancements and Releases Egnyte Document Room: The Egnyte Document Room is a secure hub for sharing sensitive information.

How to respond to a data breach

In terms of financial and reputational impact, a data breach is one of the most serious security challenges an organisation can experience. Kroll’s 2021 Data Breach Outlook report states that the pattern of data attacks becoming broader and deeper during the pandemic has continued, even during the recovery phase. With the volume of data breaches continuing to increase, it is essential that organisations take steps to prepare their incident response before they are affected by a breach.

More Than Just a RAT: Unveiling NjRAT's MBR Wiping Capabilities

NjRAT (also known as Bladabindi) malware is a Remote Access Trojan (RAT) that was first discovered in 2012. This malware strain has persisted in the threat landscape up to the present day, most recently earning notoriety for its active campaigns against agencies and organizations located in the Middle East and North Africa. Upon successful infiltration into a target host or system, NjRAT can allow the attacker to remotely access and exercise control over the compromised system.

Final Cybersecurity Awareness Month Thoughts: Don't Get Hooked By a Phishing Email

We close out Cybersecurity Awareness Month for 2023 with a few final points that show that a company's security is a team sport, one in which everyone must participate. As noted in Trustwave SpiderLabs recent report, 2023 Financial Services Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies, phishing is one of the most effective methods attackers use to gain an initial foothold in financial services organizations.