UK & Allies Sanction Prolific Cyber Hacker; Leader of LockBit

The UK, US and Australia have sanctioned the Russian leader of cyber-crime gang LockBit. UK, US and Australia sanction Russian leader of cyber-crime gang LockBit LockBit were one of the most prolific ransomware groups in recent years, responsible for attacks on over 200 UK businesses and major public service providers UK and Allies crack down…

Read More

Zeron Launches India’s First Cyber Quantified Model Bfsi Companies

With cyber threats evolving at an unprecedented pace and regulatory requirements becoming increasingly stringent, Zeron, a Mumbai based cybersecurity startup, has launched India’s first advanced Cyber Quantified model called Quantified Business Exposure to Risks (QBER) for BFSI companies. As the inaugural CRQ model from India, QBER sets a new standard for cyber risk quantification, offering…

Read More

Sophos: New ‘Junk Gun’ Ransomware disrupts RaaS Space

RaaS market disruption The ransomware-as-a-service (RaaS) market is getting disrupted, which has armed hackers with easy-to-use, off-the-shelf, and affordable ransomware solutions. The market, which has witnessed the disappearance of big players for over two years, is getting populated with ‘Junk Gun’ ransomware on the dark web The new family of ransomware is attracting ‘buyers’ because…

Read More

Zscaler Acquires Airgap Networks to Enhance Zero Trust SASE

Zscaler has announced the acquisition of Airgap Networks, a company renowned for its agentless segmentation technology. This acquisition is set to redefine the way enterprises protect their internal traffic, particularly in IT and Operational Technology (OT) environments. Cybersecurity rapidly evolves, with adversaries employing sophisticated techniques to bypass traditional security measures. However, traditional methods like Network…

Read More

Apple Drops Term ‘State-Sponsored’ Attacks from its Threat notification Policy

Apple’s Removes the term “State-Sponsored” from its description of Threat Notifications Apple Inc (AAPL.O), opens new tab has warned its users in India and 91 other countries that they were possible victims of a “mercenary spyware attack,” dropping the word “state-sponsored” it used in its previous alerts to refer to such malware attacks. Apple discovered that attackers…

Read More

Asia/Pacific* Security Spending to Grow 12.3% in 2024; IDC

IDC’s latest Worldwide Semiannual Security Spending Guide According to IDC’s latest Worldwide Semiannual Security Spending Guide, spending on security hardware, services, and software in Asia/Pacific excluding Japan (APeJ) is expected to reach $36 billion in 2024, an increase of 12.3% over the previous year. With the evolving threat landscape and increasing complexities, organizations in the region are…

Read More

Alert: Hackers Hit High-Risk Individuals’ Personal Accounts

Calling all high-risk individuals: Ensure you’re taking adequate steps to secure your personal devices and accounts against hacking, tampering and other types of interference. Britain’s National Cyber Security Center is warning that criminals and nation-state hacking groups, confronted with well-managed corporate cybersecurity defenses, have turned their sights to individual personal devices and accounts. “In recent years there…

Read More

Regulation Remains the Strongest Multiplier to Cybersecurity Growth; Frost & Sullivan

Newly released report ahead of GISEC Global 2024 offers deep dive into current conditions of the region’s cyber security industry In 2023, the United Arab Emirates (UAE) actively repelled more than 50,000 cyberattacks daily, according to the UAE Cybersecurity Council. In the first three quarters of the same year, the country successfully prevented over 71…

Read More

Cybercriminals Transform Raspberry Pi Into A Tool For Fraud & Anonymization: GEOBOX Discovery

  Resecurity identified a new solution advertised on the Dark Web – GEOBOX, a custom software, purpose-built for Raspberry Pi devices, representing an evolution in tooling for fraud and anonymization. Notably, the cybercriminals transformed widely used geek-favorite device into a ‘plug-and-play’ weapon for digital deception – enabling the operator to spoof GPS locations, emulate specific…

Read More

Google Introduces Enhanced Real-Time URL Protection for Chrome Users

URL protection is an advanced email security service rewrites all links in inbound email and scans the destination website in real-time when clicked by the user to ensure that suspicious websites are blocked, no matter which client or which device is being used. Google recently announced an enhanced version of Safe Browsing to provide real-time, privacy-preserving URL…

Read More