'

Understanding the Top 5 OWASP Vulnerabilities: Protecting Your Online Security

Understanding the Top 5 OWASP Vulnerabilities: Protecting Your Online Security

In today’s digital age, ensuring the security of our online information has become more crucial than ever. Cybercriminals are continually finding new ways to exploit vulnerabilities in software and gain unauthorized access to sensitive data. To help combat these threats, the Open Web Application Security Project (OWASP) has identified the top 10 vulnerabilities that developers … Read more

Iran-linked spy APT MuddyWater ratchets up anti-Israel attacks: Report

Iran-linked spy APT MuddyWater ratchets up anti-Israel attacks: Report

The advanced persistent threat (APT) espionage group known as MuddyWater, which is widely thought to be operated by the Iranian Ministry of Intelligence and Security, has launched a new campaign against Israeli government targets, according to a report from cybersecurity firm Deep Instinct. That campaign, uses a file-sharing service called Storyblok to host a multistage … Read more

Recent High-Profile Security Breaches: An Overview

Recent High-Profile Security Breaches: An Overview

Data breaches have become an unfortunate reality in today’s interconnected world. Cybercriminals are constantly seeking vulnerabilities to exploit, leading to significant security breaches. In this article, we will delve into some of the most recent high-profile security breaches. These recent high-profile security breaches highlight the ongoing challenges organizations face in safeguarding sensitive data. The compromised … Read more

Announcing Microsoft Secure Future Initiative to advance security engineering

Announcing Microsoft Secure Future Initiative to advance security engineering

Today Microsoft’s Vice Chair and President Brad Smith shared insight on the global cybersecurity landscape and introduced our Secure Future Initiative. These engineering advances anticipate future cyberthreats, such as increasing digital attacks on identity systems. They also address how we will continue to build secure foundations necessary for the AI era and beyond. In the … Read more

UK NCSC issues new guidance on post-quantum cryptography migration

UK NCSC issues new guidance on post-quantum cryptography migration

The UK National Cyber Security Centre (NCSC) has published updated guidance to help system and risk owners plan their migration to post-quantum cryptography (PQC). The guidance builds on the NCSC 2020 white paper Preparing for Quantum-Safe Cryptography and includes advice on algorithms choices and protocol considerations following the availability of draft standards from the US … Read more

Aerospace Giant Boeing Confirms Cyber Compromise, LockBit Claims Responsibility

Aerospace Giant Boeing Confirms Cyber Compromise, LockBit Claims Responsibility

Boeing, the American multinational corporation most known for the manufacturing of aircrafts, rockets, satellites, and missiles, has confirmed a cyber breach on their systems. Last week, the infamous and prolific ransomware gang, LockBit, announced that “a tremendous amount of sensitive data was exfiltrated” from Boeing’s systems and was ready to be published if the company … Read more