CipherStash Raises $3 Million for Encryption-in-Use Technology

October 19, 2023 at 08:42AM Australian cybersecurity startup, CipherStash, has raised $3 million in a seed funding round led by Skip Capital. The company uses queryable encryption technology to protect data, offering tighter access controls and tracking capabilities. CipherStash’s solution integrates with various programming languages and databases. The funding will support the expansion of their … Read more

FBI: Hackers Are Extorting Plastic Surgery Providers, Patients

October 18, 2023 at 04:46PM Cybercriminals are targeting plastic surgery offices, stealing medical records and using them to extort doctors and patients. The trend is not limited to the US, as plastic surgeons in Brazil and the UK have also been affected. The FBI has warned about these attacks and provided security tips for patients, … Read more

EPA Turns Off Taps on Water Utility Cyber Regulations

October 18, 2023 at 02:02PM The EPA has withdrawn its rules requiring cybersecurity assessments for water utilities due to legal challenges. Experts warn that this leaves the water sector vulnerable to cyberattacks, which could have serious public health and safety consequences. The EPA is now encouraging utilities to voluntarily conduct risk assessments and provide user … Read more

Israeli Cybersecurity Startups: Impact of a Growing Conflict

October 18, 2023 at 09:31AM The recent attacks by Hamas on Israel have had a significant impact on cybersecurity companies operating in Israel and those with ties to the country. Many Israeli-based firms are experiencing a reduction in manpower as reservists are called up for duty. There has also been an increase in cyberattacks against … Read more

Why Zero Trust Is the Cloud Security Imperative

October 16, 2023 at 03:07AM Zero trust, a security concept, is crucial for protecting cloud environments due to the increasing prevalence of data breaches and cyberattacks. Traditional security models that rely on securing the network perimeter are ineffective in cloud environments where data is dispersed and accessed from anywhere. Zero trust emphasizes continuous verification, least … Read more

Microsoft plans to kill off NTLM authentication in Windows 11

October 13, 2023 at 12:50PM Microsoft has announced that the NTLM authentication protocol will be phased out in Windows 11. Kerberos has replaced NTLM as the default authentication protocol since Windows 2000. Despite being used in older versions, NTLM is still vulnerable to attacks such as relay attacks and pass-the-hash attacks. Microsoft is working on … Read more

New PEAPOD Cyberattack Campaign Targeting Women Political Leaders

October 13, 2023 at 11:24AM A new cyber attack campaign called PEAPOD has targeted EU military personnel and political leaders working on gender equality. Cybersecurity firm Trend Micro has attributed the attacks to a threat actor known as Void Rabisu, which is associated with Cuba ransomware. The group conducts both financial motivated and espionage attacks, … Read more

Void Rabisu Targets Female Political Leaders with New Slimmed-Down ROMCOM Variant

October 13, 2023 at 03:59AM Void Rabisu, a threat actor associated with financially motivated ransomware attacks, has shifted its focus to targeted campaigns on Ukraine and countries supporting Ukraine. They have developed a new variant called ROMCOM, which they used in campaigns targeting EU military personnel and political leaders working on gender equality initiatives. The … Read more

The Cyberwar Between the East and the West Goes Through Africa

October 12, 2023 at 01:03PM Nation-state hackers play a significant role in cyber warfare. Understanding the geopolitical dynamics is crucial for addressing nation-backed cyber threats. Africa, particularly South Africa, serves as a bridge between the East and West, making it vulnerable to cyberattacks. Collaboration between the West and Africa is essential for countering these attacks … Read more

Gaza Conflict: How Israeli Cybersecurity Will Respond

October 11, 2023 at 02:06PM Israeli cybersecurity companies are expected to play a crucial role in the war effort against Hamas, given their expertise and capabilities. As the Gaza crisis intensifies, hacktivists have already launched cyberattacks, including DDoS attacks, with experts predicting more sophisticated attacks targeting infrastructure, civilians, and military targets. The Israeli military has … Read more