Phishing attacks ramped up during pandemic, reveals Sophos

Phishing is often first step in complex, multi-stage attacks. According to Sophos Rapid Response, attackers frequently use phishing emails to trick users into installing malware or sharing credentials that provide access to the corporate network.

Conti ransomware gang: An overview

Conti ransomware stands out as one of the most ruthless of dozens of ransomware gangs that we follow. The group has spent more than a year attacking organizations where IT outages can have life-threatening consequences.

Proofpoint reveals 72% of UAE CISOs feel unprepared to deal with a cyberattack

This year’s Voice of the CISO report examines global third-party survey responses from more than 1,400 CISOs at mid to large size organizations across different industries.

Hackers are using Telegram as a remote malware distribution center story

The attacker first creates a Telegram account and a Telegram ‘bot.’ A Telegram bot account is a special remote account with which users can interact by Telegram chat or by adding them to Telegram groups, or by sending requests directly from the input field by typing the bot’s Telegram username and a query.

Developing a cybersecurity mindset

The core outcome of many DX projects are the end user or internal employee management applications. These applications are a direct window to enterprise core resources and must be protected from ground up i.e., at the source code level to ensure they are secured and comply to international and local guidelines.