The human-AI partnership: a guide towards secure coding
Cybersecurity Insiders
by cyberinsiders
2h ago
[Pieter Danhieux Co-Founder and CEO, Secure Code Warrior] The doomsayers are, so far, losing the argument. The panic around AI replacing humans has been countered with a new narrative: “Let AI redefine your job rather than replace it.” According to a recent survey from Stack Overflow, 44% of developers are either using or planning to use AI tools—even though just 3% “highly trust” the accuracy of the results. Twice as many (6%) say they highly mistrust AI due to security concerns and inaccuracy. There remains at least some debate among developers on whether to embrace these tools, though many ..read more
Visit website
Ransomware attack on Big Issue and University of Winnipeg
Cybersecurity Insiders
by Naveen Goud
6h ago
The Qilin Ransomware group is under scrutiny for breaching the servers of the UK-based newspaper ‘The Big Issue Group.’ Reports indicate that the perpetrators successfully accessed confidential data from the victim and are now holding the entire database hostage, encrypting it until a ransom is paid. The Big Issue, a newspaper primarily serving the homeless community, is diligently exploring avenues to recover the data. It’s been revealed that the breach may have resulted in the loss of approximately 500GB of critical data, including contracts, partner information, personal data, and financial ..read more
Visit website
Cyber Attack suspected behind Baltimore Bridge Collapse
Cybersecurity Insiders
by Naveen Goud
6h ago
The incident that shook Baltimore on March 26, 2024, when a cargo vessel collided with the Baltimore Bridge, resulting in its collapse into the Patapsco River, has sparked widespread speculation and concern. In the early hours of March 27, 2024, several publications shared photos of the bridge collapse, raising questions about the possibility of foul play by adversaries. A hashtag quickly gained traction on social media platform X (formerly Twitter), suggesting that the Francis Scott Key Bridge was targeted in a cyber-attack, leading to the collision with the container ship. This unexpected de ..read more
Visit website
Has the third world war started with Baltimore Bridge Collapse with Cyber Attack
Cybersecurity Insiders
by Naveen Goud
20h ago
The incident that shook Baltimore on March 26, 2024, when a cargo vessel collided with the Baltimore Bridge, resulting in its collapse into the Patapsco River, has sparked widespread speculation and concern. In the early hours of March 27, 2024, several publications shared photos of the bridge collapse, raising questions about the possibility of foul play by adversaries. A hashtag quickly gained traction on social media platform X (formerly Twitter), suggesting that the Francis Scott Key Bridge was targeted in a cyber-attack, leading to the collision with the container ship. This unexpected de ..read more
Visit website
Securing Mobile Application Development: 9 Best Practices for Data Security
Cybersecurity Insiders
by Naveen Goud
1d ago
In today’s interconnected world, mobile applications play a pivotal role in our daily lives, facilitating everything from communication and entertainment to productivity and commerce. However, with the proliferation of mobile apps comes the heightened risk of data breaches and security vulnerabilities. Ensuring robust data security measures throughout the mobile application development process is essential to protect sensitive user information and maintain trust. 1. Threat Landscape Awareness: Developers must stay informed about the evolving threat landscape surrounding mobile applications. Un ..read more
Visit website
Agenda Ransomware Targeting VMware and 17k Microsoft Exchange servers vulnerable to cyber attacks
Cybersecurity Insiders
by Naveen Goud
1d ago
Agenda Ransomware targets VMware servers A recent emergence in the cyber threat landscape has revealed the presence of a new variant of ransomware known as Agenda Ransomware, which has swiftly made its mark by targeting VMware ESXi servers worldwide. This variant, suspected to be a recent addition to the malware arsenal, has been active since 2022, causing concerns among cybersecurity experts. Previously recognized under monikers such as Qilin or Water Galura, this particular strain of file-encrypting malware has primarily set its sights on servers operating within critical sectors like manufa ..read more
Visit website
New Zealand accuses China for hacking the Parliament
Cybersecurity Insiders
by Naveen Goud
2d ago
After the United Kingdom’s purported accusation against China of launching a cyber attack on its Electoral Commission in 2021, allegedly aimed at stealing data pertaining to over 40 million voters, New Zealand (NZ) government has directly pointed fingers at China for hacking into the computer network of its Parliament Counsel Office. The NZ government issued a stern warning, denouncing such state-sponsored attacks as alarming and unacceptable. It asserted that the country’s intelligence services possess evidence supporting its claims. Cyber espionage has emerged as a key tool for nations such ..read more
Visit website
How personalized phish training can thwart evolving cyberattacks
Cybersecurity Insiders
by Jane Devry
2d ago
[By: Matt Lindley, COO and CISO at NINJIO] Although the cyberthreat landscape is constantly shifting, several major cybercriminal tactics have stood the test of time. Phishing is one of them. Despite being among the best-known cyberthreats, the damage inflicted by phishing attacks keeps rising. This is because phishing exploits ingrained psychological vulnerabilities that are difficult for victims to overcome, and it has proven uniquely capable of adapting over time.    Another reason for the devastating effectiveness of phishing is the fact that employees have different susceptibili ..read more
Visit website
Medusa Ransomware group demands $700k from victims
Cybersecurity Insiders
by Naveen Goud
2d ago
Tarrant Appraisal District (TAD), a governmental entity in Texas, has made headlines due to a sophisticated cyber attack suspected to be orchestrated by the Medusa Ransomware group. The incident came to light on March 24th, 2024, prompting an emergency meeting chaired by Vince Puente, the board chairperson, after the district’s IT personnel uncovered a digital breach within its infrastructure. Reports indicate that the hackers have demanded a ransom of $700,000 to release the encrypted data, resulting in the district’s systems being offline for approximately a week. While the threat actors cla ..read more
Visit website
Hackers steal Roku credit card details to make fraudulent purchases
Cybersecurity Insiders
by Naveen Goud
3d ago
Hackers have reportedly gained unauthorized access to credit card information from approximately 15,000 Roku accounts, according to a disclosure from the media streaming company. With a user base exceeding 80 million active accounts, Roku has become a prime target for cybercriminals. The breach notification, submitted to the California Office of the Attorney General, confirmed that the attackers were successful in obtaining credit card data. Roku’s security teams determined that the breach occurred within the Roku Channel and TV operating system, spanning from December 28 of the previous year ..read more
Visit website

Follow Cybersecurity Insiders on FeedSpot

Continue with Google
Continue with Apple
OR