Palo Alto Networks and IBM to Jointly Provide AI-powered Security Offerings

IBM to Deliver Security Consulting Services Across Palo Alto Networks Security Platforms News Summary:  IBM to platformize internal security solutions with Palo Alto Networks; Palo Alto Networks will be its preferred cybersecurity partner across network, cloud and SOC Palo Alto Networks will incorporate watsonx large language models (LLMs) in Cortex XSIAM to deliver additional Precision…

Read More

Misinformation and Hacktivist Campaigns Target The Philippines Amidst Rising Tensions With China

Amidst rising tensions with China in the South China Sea, Resecurity has observed a significant spike in malicious cyber activity targeting the Philippines in Q1 2024, increasing nearly 325% compared to the same period last year. The number of cyberattacks involving hacktivist groups and foreign misinformation campaigns has nearly tripled. In Q2 2024, this growth trajectory continues, with Resecurity observing multiple cyberattacks staged by previously unknown threat actors. These attacks are characterized by the…

Read More

Zscaler Acquires Airgap Networks to Enhance Zero Trust SASE

Zscaler has announced the acquisition of Airgap Networks, a company renowned for its agentless segmentation technology. This acquisition is set to redefine the way enterprises protect their internal traffic, particularly in IT and Operational Technology (OT) environments. Cybersecurity rapidly evolves, with adversaries employing sophisticated techniques to bypass traditional security measures. However, traditional methods like Network…

Read More

Be the Change: Leveraging AI to Fast Track Next-GenCyber Defenders; Diwakar Dayal, SentinelOne

Diwakar Dayal, MD and Country Manager at SentinelOne Cybersecurity is among the top things keeping CISOs up at night. To keep their infrastructure and data safe, security teams have to manage an ever-growing number of data sources on the scale of petabytes. While the know-how to protect these assets exist, the lack of skilled talent…

Read More

IIT Kanpur, C3iHub, Launches Start-Up Cohorts Specialising In Specific Cybersecurity Areas

  C3iHub, a National Technology Innovation Hub (TIH) for Advanced Cybersecurity at the Indian Institute of Technology Kanpur (IITK), launched start-up cohorts III, IV, and V at the Hyatt Regency, New Delhi. Funded by the Department of Science and Technology (DST) under the NM-ICPS Mission, C3iHub presented 19 start-ups in the Start-up Incubation Program, specialising in specific…

Read More

Alert: Hackers Hit High-Risk Individuals’ Personal Accounts

Calling all high-risk individuals: Ensure you’re taking adequate steps to secure your personal devices and accounts against hacking, tampering and other types of interference. Britain’s National Cyber Security Center is warning that criminals and nation-state hacking groups, confronted with well-managed corporate cybersecurity defenses, have turned their sights to individual personal devices and accounts. “In recent years there…

Read More

Regulation Remains the Strongest Multiplier to Cybersecurity Growth; Frost & Sullivan

Newly released report ahead of GISEC Global 2024 offers deep dive into current conditions of the region’s cyber security industry In 2023, the United Arab Emirates (UAE) actively repelled more than 50,000 cyberattacks daily, according to the UAE Cybersecurity Council. In the first three quarters of the same year, the country successfully prevented over 71…

Read More

Cybercriminals Transform Raspberry Pi Into A Tool For Fraud & Anonymization: GEOBOX Discovery

  Resecurity identified a new solution advertised on the Dark Web – GEOBOX, a custom software, purpose-built for Raspberry Pi devices, representing an evolution in tooling for fraud and anonymization. Notably, the cybercriminals transformed widely used geek-favorite device into a ‘plug-and-play’ weapon for digital deception – enabling the operator to spoof GPS locations, emulate specific…

Read More