Newsroom

How to Identify & Avoid Phishing Scams

Phishing is the fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers. With the sensitive information obtained from a successful phishing scam, cybercriminals can do severe damage to your financial history and personal reputation that can take years to unravel. According to AAG-IT, it is the most common form of cybercrime with an estimated 3.4 billion spam emails sent every day. However, there are many things that you can do to protect yourself from these attacks.

Continue Reading

Ferrari Customer Data Targeted in Ransomware Attack

The iconic Italian luxury car manufacturer, Ferrari, confirmed on Monday that a threat actor had demanded a ransom related to customer contact details that may have been exposed in a ransomware attack. The company stated that the attack did not affect its manufacturing operations, but they have warned customers that personal data including names, addresses, email addresses, and phone numbers, could be at risk. However, Ferrari has found no evidence that financial information and details on owned or ordered cars have been compromised.

Continue Reading

The Cost of Cyberattacks: Why Investing in Cybersecurity Personnel is Worth It

As the frequency and sophistication of cyberattacks continue to increase, many businesses are realizing the importance of investing in cybersecurity measures to protect their data and assets. While some organizations may view hiring cybersecurity employees as an unnecessary expense, the cost of a cyberattack can far outweigh the investment in cybersecurity personnel. 

Continue Reading

Why You Should Use a VPN

A Virtual Private Network (VPN) is a secure connection tool that provides additional privacy and anonymity online. They can encrypt your internet traffic and route it through a server, hiding your IP address and location when you are browsing, streaming, downloading, and so on. A VPN can protect your identity even if you are using public or shared Wi-Fi, and your data will be kept private from corporations, government agencies, and hackers.

Continue Reading

How to Hire in the Cyber Industry for 2023

To hire the best cyber team, you need to define the specific skills and experience you’re looking for and use recruiting platforms and job boards to advertise your open positions. You should also conduct thorough interviews and assessments to evaluate candidates’ skills and experience, and consider using a third-party recruiting firm or consultant to help you identify top talent.

Continue Reading

Steps to Take When Looking for a New Job in 2023

Applying for a new job in 2023 can be a challenging but rewarding process. Before you start applying, it’s important to identify your career goals and what you’re looking for in a job. This will help you focus your search and make it easier to find opportunities that align with your interests and aspirations.

Continue Reading

Uber Dealing with Data Breach After Attack on Vendor

Uber Technologies Inc. is currently investigating the hack of its vendor, Teqtivity, which helps manage and track information technology equipment. The cyberattack has leaked data and the email addresses of over 77,000 Uber employees. Some of this data includes archives which are believed to be source code associated with mobile device management platforms used by Uber and Uber Eats. This source code is extremely valuable to cyber-criminals as it forms part of the company’s intellectual property and can be used to find other vulnerabilities that will open the door to further cyberattacks.

Continue Reading

Deloitte Fires Employee from India Accused of Running Global Hacking Gang

Deloitte India has terminated an employee this week accused of running a global hacking gang, WhiteInt. The gang was exposed in a sting operation conducted by “The Sunday Times” and the Bureau of Investigative Journalism. This expose revealed that several Indian hackers were offering services to hack into private email accounts and messages of victims after receiving intel from autocratic states and wealthy businessmen.

Continue Reading