Find

April 5, 2021

Instagram scams and how to avoid them

This scamming has worsened over the past year, with the BBC claiming in January 2021 that Instagram fraud reports have increased by 50% since the coronavirus outbreak began in 2020. As our digital lives continue to grow, and online scammers learn new tricks, it is important to know how to identify an Instagram scam.
by | 4 min read
March 21, 2021

Here’s how TECHx celebrated International Women’s Day 2021!

With more women taking on leadership positions in technology, TECHx, in association with Lexar, launched a #WomenInTech campaign to recognize and celebrate inspirational women who have made significant contributions to the ICT industry in the region.
by | 2 min read
March 2, 2021

Countering Bigger, Meaner, Smarter Cyber-attacks: AHAD to conduct a virtual workshop

With more and more organisations going digital to counter pandemic-related business challenges, cybercriminals and other threat actors are exploiting the growing vulnerability and complexity of enterprise IT networks.
by | 2 min read
November 3, 2020

Securing the hybrid workforce begins with 3 crucial steps

Once organizations know where the threats lie, they can tactfully approach training with strategies to refine IT and user security, putting additional preparation tactics in place. Identifying the top three mechanisms can help IT administration isolate RDP servers with backup components, integrate tools to assess the threat of phishing attacks.
by | 4 min read
September 22, 2020

The realities of ransomware: Extortion goes social in 2020

The criminals behind Maze ransomware began incorporating this tactic of steal and share as additional extortion pressure in their ransomware operations. The first such incident occurred in November 2019 when the Maze crew released a portion of a victims’ stolen data in a show of force and added social pressure for the company’s lack of payment.
by | 2 min read
September 21, 2020

Maze tries to execute $15M ransomware attack: Three strikes, and Maze was out

The investigation revealed that the attackers had penetrated the network at least six days before their first attempt to launch the ransomware payload. During this time, the attackers explored the network, ran legitimate third party tools.
by | 2 min read
September 7, 2020

Cloud Box Technologies unveils new security practice to develop its portfolio

The portfolio of cyber security services from CBT now includes system protection, network and data protection, cloud security, identity and access governance, and managed and professional security services.
by | 2 min read
August 5, 2020

Five initial signs organizations are about to get hit by ransomware

Attackers use legitimate admin tools to set the stage for ransomware attacks. Without knowing what tools administrators normally use on their machines, one could easily overlook this data.
by | 3 min read
July 26, 2020

Zero Trust Model: A holistic approach to cybersecurity

Zero trust is a holistic approach to security that addresses threats and changes in how businesses work. It's a model and a philosophy for organizations on how to think about and how to do security. The model guides you to treat all devices as if they were internet-facing and, instead of having one single perimeter, you must create many micro perimeters (or microsegments), applying checks and controls around everything and between everything.
by | 3 min read
July 9, 2020

75% of UAE organizations experience public cloud security incidents

According to The State of Cloud Security 2020, a global survey from Sophos, three quarters (75%) of organizations from the UAE experienced a public cloud security incident in the last year.
by | 2 min read