According to a published document last Friday, the US Department of Commerce has restricted trade with six Russian organizations, four of which are information technology and cybersecurity firms, including two other entities that are allegedly posing a threat to the US national security. The six Russian firms added to the Entity List of the Department of Commerce...Continue Reading
The first phishing attack was recorded in the mid-1990s and targeted America Online (AOL). Since then, threat actors continue to create phishing campaigns and targets individual, small to mid-size, and large companies. Phishing uses social engineering attacks to steal sensitive or confidential information such as login credentials, credit card numbers, and personally identifiable information. The...Continue Reading
In today’s business landscape, a cyberattack is now noted as the most prominent risk to every financial system in the world. It is considered higher than the lending and liquidity risks that resulted in the financial crisis of 2008, as stated by the Federal Reserve Chairman, Jerome Powell. The assessment of the world’s leading banking...Continue Reading
DDoS or Distributed Denial of Service is a type of malicious cyberattack that aims to flood and overwhelm a website or server with traffic that is more than what it can handle. As a result, this attack disrupts the service availability of the targeted website to render it inoperable. We have observed over recent years...Continue Reading
A major unexpected incident happened in Strasbourg, France, where the data centres of OVH, a web hosting and cloud computing company. OVH is considered the third-largest hosting service provider globally and the largest in Europe. They also provide VPS, dedicated server hosting and various web services. Consumers and clients of OVH are being advised to...Continue Reading
RIPE NCC has disclosed a cyber-attack attempt against their single-sign–on service (SSO). They immediately issued a warning of possible credential-stuffing attack attempts and recommended their users to activate two-factor authentication (2FA). They need to disclose the hacking attempt because they are the regional internet registry for Europe, Western Asia and the former Soviet Union. RIPE...Continue Reading
A few years ago, experts and cybersecurity researchers tried to imagine the kind of tactics and manipulation campaigns that might threaten the 2018 and 2020 elections. The misleading AI-generated videos have topped the list. Even though the technology is still emerging at that time, the projected potential abuse when utilized was very alarming that technology...Continue Reading
Akamai Technology is considered as one of the key players that offer digital and security services worldwide. With its vast network interconnectivity placed strategically in every corner of the globe, their contribution in having fast, reliable, and secured data and internet services becomes notable in the cyberworld. The Inverse Company’s recent acquisition by Akamai...Continue Reading
The Russian government issued a warning to organizations and companies in Russia regarding possible cyberattacks by the US as retaliation for the recent SolarWinds data breach. Just December 2020, SolarWinds had disclosed they suffered a sophisticated attack that led to a data breach affecting 18,000 clients and customers worldwide. Based on the reports and analysis...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.