Search results for "cyber attack"

Don't Believe the Hype: IIoT Technology Doesn’t Expand Attack Surface  

The Industrial Internet of Things (IIoT) technology has been rapidly growing in popularity in recent years. With IIoT, manufacturers can monitor their equipment, reduce downtime, and optimize production processes. However, concerns about IIoT attacks have led some to question whether IIoT increases the attack surface and makes industrial equipment more vulnerable to cyber-attacks. This article […]

Are We Creating a Breed of Super Cyber Criminals?

To humanity’s dismay, one’s noble intentions when innovating technology is a moot point. Once that creation is out there, made available to everyone, its application is open to interpretation. Someone somewhere will always find nefarious uses for the technology. And those are cyber criminals. The Dangers of Cyber Criminals The same technology that allowed companies […]

Russian Hackers Preparing New Cyber Assault Against Ukraine - Microsoft Report

Russian hackers appear to be preparing a renewed wave of cyber attacks against Ukraine, including a “ransomware-style” threat to organizations serving Ukraine’s supply lines, a research report by Microsoft said on Wednesday. The report, authored by the tech giant’s cyber security research and analysis team, outlines a series of new discoveries about how Russian hackers […]

Business IoT: What Cyber Security Tells Us

Everything in this world could be represented by a coin, having a good side and a bad side. And the Internet of Things (IoT) is no different. On one side, life is easier when all our appliances and devices are connected to each other and talking to one another. Conversely, it puts your data at […]

Ensuring Data-Centric Security in a Dynamic Cyber Environment

Just imagine that you can no longer access your email or use the internet; this is a small glimpse of the cyber-attacks that telecoms are facing nowadays. The continuous involvement of technology in our daily lives makes distributed denial services (DDoS) attacks something forcibly enacted. No one is immune to the security threats which raised […]

The Increasing Challenges of Cybersecurity

While technology is helping organizations optimize their operations through various innovative means, the number of cybersecurity threats companies must deal with has grown. Who hasn’t heard about ransomware, phishing attacks, malware attacks, and such? More importantly, who hasn’t asked the question, what are the challenges in cybersecurity realms? The only thing more valuable than information […]

Cybersecurity War: What Hides Beneath It

China began enforcing its most recent cybersecurity regulations,”MLPS 2.0,” which mandate that businesses install government-approved network equipment and make their networks transparent to Chinese government authorities. The Chinese Ministry of Public Security will now receive cybersecurity strategy reports from all companies operating in China. They will be permitted to monitor their secure networks. According to […]

A Strive Toward Cyber Resilient Nations: A Cybersecurity Ecosystem

With the world’s accelerated industrial and technological revolution, countries are increasingly adopting intelligent digital solutions to fortify their frameworks, be it economic, sustainable, or even security. With the world’s interconnection, the fusion of development is amplifying, and with this upsurge, the global embrace of technological means has reached new pinnacles. Technologies such as Artificial Intelligence […]

Cyber Resilience Framework in South Africa

Cybersecurity started in the 1980s after Morris created the first worm, a program capable of moving through a network and leaving behind a trail. Ever since then, cybercrime has only evolved to become the digital era’s biggest problem. Subsequently, companies and individuals alike now need to put up exceptional cyber defenses and put down protocols […]

Cybersecurity During the Fifa World Cup 2022

With billions of worldwide Fifa World Cup viewers, it is a gold mine for hackers and malicious actors to exploit. Football fans aren’t the only ones tuned in to see some of the world’s top players fight for the title of 2022 champions. These eye-catching events also pique the interest of cyber threat actors with […]