Indian Organisations Incapable of Preventing Almost Half of Cyberattacks: Report

Indian Organisations Incapable of Preventing Almost Half of Cyberattacks: Report

Indian organisations are incapable of preventing almost half of cyber attacks as 64 percent of cybersecurity teams are too busy fighting critical incidents to take a proactive stance, claims a report.  As many as 78 percent of Indian respondents believe their organisations could better defend against cyber attacks with more resources dedicated to preventive cybersecurity, …

Read more

The NSA has a new security center specifically for guarding against AI

The NSA has a new security center specifically for guarding against AI

The National Security Agency (NSA) is starting a dedicated artificial intelligence security center, This move comes after the government has begun to increasingly rely on AI, integrating multiple algorithms into defense and intelligence systems. The security center will work to protect these systems from theft and sabotage, in addition to safeguarding the country from external …

Read more

Security or performance? Zenbleed forces you to choose

Security or performance? Zenbleed forces you to choose

AMD Recently, a cybersecurity researcher discovered a dangerous vulnerability within AMD’s Zen 2 processors. Dubbed “Zenbleed,” the vulnerability allows attackers to gain access to your computer and steal all of the most sensitive information, including passwords and encryption keys. While this doesn’t affect AMD’s best processors, it’s still a dangerous vulnerability with a wide reach, …

Read more

Maya OS to Replace Microsoft Windows on Defence Ministry Computers Amid Rising Cyber Threats: Details

Maya OS to Replace Microsoft Windows on Defence Ministry Computers Amid Rising Cyber Threats: Details

A recent report suggests that Maya OS is set to replace Windows as the operating system on the computers used by the Defence Ministry. In contrast to Microsoft’s proprietary operating system, the Ministry of Defence has opted for a Linux-based OS, specifically based on the popular Ubuntu distribution. Over a period of six months, government …

Read more

Intel CPUs are leaking passwords and killing performance

Intel CPUs are leaking passwords and killing performance

Intel A critical vulnerability has recently emerged in certain Intel processors, raising concerns for billions of users who could potentially be affected. Although the best CPUs remain unaffected, this vulnerability, known as Downfall, has the potential to expose sensitive data, including passwords. The renowned researcher, Daniel Moghami from Google, who discovered this flaw, has provided …

Read more

MOVEit Hack Compromised Data at Around 600 Organisations Globally; Fallout Is Only Beginning: Cyber Analysts

MOVEit Hack Compromised Data at Around 600 Organisations Globally; Fallout Is Only Beginning: Cyber Analysts

A major data breach linked to a single American software company has affected approximately 600 organizations worldwide, according to cyber analysts confirmed by Reuters. Despite the breach being disclosed by Progress Software, based in Massachusetts, over two months ago, the number of victims continues to grow. The breach has impacted nearly 40 million individuals who …

Read more

This PowerPoint could help hackers empty your bank account

This PowerPoint could help hackers empty your bank account

Sora Shimazaki / Pexels With the constant rise of cybersecurity threats, it is becoming increasingly clear that dangerous malware lurks in every corner. In a ironic twist, malware has now infiltrated PowerPoint presentations disguised as helpful guides for protecting against phishing attacks. However, the true danger lies in the fact that this malware can potentially …

Read more

Cybercriminals Assume Identity of a Cybersecurity Company in Order to Hijack and Encrypt Your PC

Cybercriminals Assume Identity of a Cybersecurity Company in Order to Hijack and Encrypt Your PC

New methods of attack by hackers continue to emerge, making it increasingly difficult to trust even reputable sources. A recent example is a ransomware attack known as SophosEncrypt, which impersonates the cybersecurity vendor Sophos. This attack can seize control of your files or even your entire PC, demanding payment for decryption. Initially believed to be …

Read more

TSMC Reports Cyberattack on IT Hardware Supplier

TSMC Reports Cyberattack on IT Hardware Supplier

Taiwan Semiconductor Manufacturing (TSMC) made an announcement on Friday, revealing that one of its IT hardware suppliers had experienced a cybersecurity incident resulting in the leakage of the supplier’s company data. TSMC stated, “We have recently been informed that one of our IT hardware suppliers encountered a cybersecurity incident which caused the exposure of sensitive …

Read more