Home » cybersecurity » Page 4

cybersecurity

Cloud Computing: Africa’s Liquid Partners with the UK’s Telesmart.io

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Infamous North Korean hacker group identified as suspect for $100M Harmony attack

The Lazarus Group, a well-known North Korean hacking syndicate, has been identified as the primary suspect in the recent attack that saw $100 million stolen from the Harmony protocol.  According to a new report published Thursday by blockchain analysis firm Elliptic, the manner in which Harmony’s Horizon bridge was hacked and the way in which the stolen digital assets were consequently laundered bears a striking resemblance to other Lazarus Group attacks. “There are strong indications that North Korea’s Lazarus Group may be responsible for this theft, based on the nature of the hack and the subsequent laundering of the stolen funds.” Additionally, Elliptic outlined exactly how the heist was executed, noting that The Lazarus Group targeted the login credentials of Harmony employees in ...

3 Ways to Optimise Cloud Security Beyond What is in Place

Modernising business infrastructure by migrating to the cloud has become one of the most significant organisational priorities today. Unfortunately, as companies across industry sectors make the shift from on-premises to this dynamic new environment, so too has there been a tremendous increase in cyber threats and attacks. Contrary to the widely held belief, cloud computing is not the panacea for security many make it out to be. The most effective cyber attackers target the weakest points in any company’s digital defences. In fact, there has been a 50% surge in more sophisticated cyberattacks over the past year. This can at least partly be attributed to the rate at which new cloud deployments are taking place which makes it difficult for business and technology leaders to keep up and ensur...

The Cybersecurity Wave: Importance and Impact of Cybersecurity in Today’s Digital World

Cyberattacks continue to be a threat to organizations across the world, but using powerful cybersecurity solutions can help you defend your organization against these malicious attacks. Without proper security management, your organization is an easy target for cybercriminals. Poor configuration of cloud services combined with how easy it is for cybercriminals to launch an attack poses a great threat to organizations. On top of this, cybercriminals often target entities outside of their jurisdiction, making it difficult for governing bodies to draft effective cybersecurity policies. Unlike years ago, simply installing an antivirus solution across your systems isn’t enough to protect your network of devices. Cyberattacks can arise from any level of the organization. From IT admins...

Sophos Webinar: Navigating the Cybersecurity Triple Threat

As we move into 2022, ransomware shows no signs of slowing down – that’s no surprise. What we have seen in the past 18 months, however, is a shift in tactics: targets have shifted to ever-larger organizations, and the business model that dictates how ransomware attacks occur has evolved. It’s up to IT professionals to proactively deal with these trends to meet the challenges already on the horizon and beyond. Sophos and IT News Africa have collaborated to host a free webinar on 29 June 2022 to discuss the varied methods cyber attackers use to penetrate the networks of an entire organization. The webinar will review how Sophos’ EDR and MTR can help organizations detect these invasions before they escalate and, ultimately, eliminate the threat. It will also look at threat response, and why i...

Ransomware Attacks: 4 Steps to Protect Your Data

Ransomware attacks are on the rise, and the pay-out for a successful breach is growing as data becomes more and more valuable. The potential of falling victim to ransomware is escalating, and such an occurrence could end up costing billions in downtime and recovery. As we become more firmly entrenched in the cloud, it is imperative to evaluate not only the measures that have been put into place to prevent an attack but also the tools and protocols that have been implemented to help a business recover. Given the current economic climate and threat landscape, a successful ransomware attack is a strong possibility – is your backup strategy in a position to help or hinder the recovery? A proactive strategy for data One thing that has become clear is that businesses need a strategy, and a less ...

Ransomware Attacks: 4 Steps to Protect Your Data

Ransomware attacks are on the rise, and the pay-out for a successful breach is growing as data becomes more and more valuable. The potential of falling victim to ransomware is escalating, and such an occurrence could end up costing billions in downtime and recovery. As we become more firmly entrenched in the cloud, it is imperative to evaluate not only the measures that have been put into place to prevent an attack but also the tools and protocols that have been implemented to help a business recover. Given the current economic climate and threat landscape, a successful ransomware attack is a strong possibility – is your backup strategy in a position to help or hinder the recovery? A proactive strategy for data One thing that has become clear is that businesses need a strategy, and a less ...

3 Things to Consider When Deploying Data Protection for Your Small Business

Small businesses are the backbone of every growing economy, bringing growth and innovation to the communities in which they are established. However, these businesses are often vulnerable when conforming to the new standards of remote work. Today, one of the greatest threats to small businesses is a cyberattack. According to the Wall Street Journal, companies with less than $10 million in annual revenue are less likely to be prepared for cyberattacks. Fireeye also reports that while 77% of all cybercrimes are directed toward small businesses, only 42% of small business owners are concerned with cyber security. The National Small Business Association reports that as many as 60% of small businesses will fail within six months of experiencing a significant cyber breach. These findings clearly...

Chainalysis exec touts blockchain analysis to Senate homeland security committee

The collection and processing of information was a major theme at the United States Senate Committee on Homeland Security and Governmental Affairs (HSGAC) hearing titled, “Rising Threats: Ransomware Attacks and Ransom Payments Enabled by Cryptocurrency” on Tuesday. The committee hosted a panel of private-sector experts who discussed the problem of ransomware attacks and the challenges of collecting and using the information necessary to fight them.  Committee chair Gary Peters of Michigan, who introduced the Strengthening American Cybersecurity Act in February, said the government lacks sufficient data even to understand the scope of the threat posed by ransomware attacks. Attackers almost exclusively ask for payment in cryptocurrency, he added. Several figures were trotted out to qua...

How the Russia-Ukraine War Could Affect Cybercrime

Image sourced from Packetlabs. Russia’s war on Ukraine and its increasingly isolated internet environment could drive Russian cybercriminals to think outside the box and launch new forms of cyber attacks. This is according to Nclose’s Co-Founder & Technical Director, Martin Potgieter, who says speculation and concern is mounting around the world, over what Russia’s cyber crime syndicates’ next moves will be. “Currently, the cybercrime focus appears to be predominantly between Russia and Ukraine cybercrime groups and governments. While this is strictly speaking cyber warfare, it could quickly spread elsewhere. “What we are seeing is that a few of these cybercrime groups are either taking sides or imploding amongst themselves due to their Eastern European links with one another,” says Po...

How to Avoid Privacy Risks from Third-party Automotive Apps

Image sourced from Pixabay. Mobile applications for connected cars provide various features to make life easier for motorists, but they can also be a source of risk. Kaspersky experts have analysed 69 popular third-party mobile applications designed to control connected cars and defined the main threats drivers may face while using them. They found out that more than half (58%) of these applications use the vehicle owners’ credentials without asking for their consent. On top of this, one in five of the applications have no contact information, which makes it impossible to report a problem. These and other findings are published in the new Kaspersky Connected Apps report. Connected automotive applications provide a wide range of functions to make drivers’ lives easier. For example, the...