In today's digital age, where cyber threats loom around every corner, it has become crucial for organisations to prioritise cybersecurity. It is essential to set up a culture of cybersecurity in your organisation as the frequency and sophistication of cyber-attacks...
Simple Tips for Protecting Your Online Identity
The researcher’s at Cybereason Inc. has come across a new form of malware that steals user’s data of financial applications. The name of the malware is “Eventbot”.
The Importance of Data Security in 2023
The researcher’s at Cybereason Inc. has come across a new form of malware that steals user’s data of financial applications. The name of the malware is “Eventbot”.
Top 5 Cyber Security Trends in 2023
The researcher’s at Cybereason Inc. has come across a new form of malware that steals user’s data of financial applications. The name of the malware is “Eventbot”.
What is Cyber Security?
The researcher’s at Cybereason Inc. has come across a new form of malware that steals user’s data of financial applications. The name of the malware is “Eventbot”.
AlienVault OSSIM
The researcher’s at Cybereason Inc. has come across a new form of malware that steals user’s data of financial applications. The name of the malware is “Eventbot”.
Cyber Kill Chain Methodology
To be secure in the cyber space any organization needs to have a proper security strategy which helps exposing sensitive data or prevent damaging the brand image. There are several models followed by security professionals in order to actively find if any malicious...
Malware targets Financial applications through Android Devices
The researcher’s at Cybereason Inc. has come across a new form of malware that steals user’s data of financial applications. The name of the malware is “Eventbot”.
Secure your network infrastructure with Continuous Monitoring
What is the most valuable asset of your organization? The direct answer to that question for any organization is “Information”.
CLICKJACKING
Be alert when you are using websites that contain many ads. Creating ads are the current trending way into tricking users to visit malicious pages.
DeltaSpike GLOBAL SERVICES: CLOUD SECURITY AND ROLE
DeltaSpike Global Services, one of the top in-international players in IT security, had their annual partner conference at a southern beach hotel recently.
IT EXPERTS WARN OF PHONE HACKING
This includes top level politicians, senior officers of armed services, high profile government officials and all the other parties who deal with highly confidential information, they warned.“Sri Lanka,”
US EXPERT COMMENDS LANKAN BANK OFFICER WHO THWARTED GLOBAL MONEY LAUNDERING ATTEMPT
It has been found that cyber-crimes and money laundering across the world has shot up drastically in the past few years, compromising the security of many organisations.
DO WE HAVE TO INCLUDE THE ANTIVIRUS SOFTWARE TO OUR THREAT MODEL?
Using a credit or debit card is a trendy way to pay bills while reducing the risk of keeping your money in your pocket. But it is not as safe as you might assume when there are hackers who can take valuable information by just one swipe of the card.
ARE YOUR CREDIT AND DEBIT CARD DETAILS SECURE?
Using a credit or debit card is a trendy way to pay bills while reducing the risk of keeping your money in your pocket. But it is not as safe as you might assume when there are hackers who can take valuable information by just one swipe of the card.
THINK BEFORE YOU CLICK
Cybercrime has risen over the years and continues to rise globally. It has become an enormous challenge in all areas including national security, public safety and personal privacy. From simple Facebook hacking to more largescale fraudulent activities cybercrimes have taken hit at everyone, at least once.
WHAT IS A SECURITY OPERATIONS CENTER (SOC)
Information security changes constantly and at a rate beyond comprehension. Hackers too are increasingly becoming relentless, making responding to information security incidents an ever more complex challenge.
TYPES OF CYBER ATTACKS
A Cyber-Attack is any kind of action that targets a Computer Information System and damages or steals the victims data. The data acquired is modified, damaged, sold or even held at ransom from the victim. The hacker does this through various types of Cyber-Attacks.
SKIMMING IS THE NEW HACK
Sri Lanka isn’t slow to the hacking game. Alongside the rest of the world, Sri Lankan ATMS and its customers are victims to what the Cyber Security world likes to call, ATM Skimming. Heard about it?
PORT SCANNING
Organizations use different channels to reach their customers. The company website being the primary means of reaching your existing customers and potential customers these days. From startups to multinationals, every organization has their own website.
VULNERABILITY ASSESSMENT
Organizations use different channels to reach their customers. The company website being the primary means of reaching your existing customers and potential customers these days. From startups to multinationals, every organization has their own website.
WHAT IS SQL INJECTION
SQL Injection (SQLi) is one of the most dangerous web-based vulnerabilities.
OWASP, a non-profit organization, dedicated to improving security of web applications, conducts a research and lists down the top 10 vulnerabilities each year.
Benefits of Honeypots
In my previous blog I discussed Port Scanning. In this blog I would like to discuss another method used to protect servers from attackers using Network Honeypots. A Honeypot is a sweet looking server, at least it’s intended to look sweet to the attacker, similar to how bears view honey. Honeypot is an additional security protection that can be used alongside a firewall this will help to protect your network from hackers.
Incident Management Process for an effective SOC
Organizations need to have a proper, focused, and a coordinated approach to responding to incidents. This includes a system for Occasion Response that outlines the correct way for implementing the Incident Response capability.
Hiring ‘The One’ – The Role of Social Media Screening
HR teams spend weeks posting vacancies, talking to recruiters, screening through applications, calling for and scheduling interviews. (Trust them when they say hiring is not easy.
They’re only human after all…
IBM states that 60% of all cyber attacks are a direct result of insider attacks – caused by employees within an organization with malicious intent. While you might be right in assuming that this will not be the case in your company, with only a few people having access to your systems, your employees can still be responsible for potential cyber attacks, unwillingly and unknowingly.
DO’s and DON’Ts of Social Media Screening
After the initial screening is done and a few potential candidates are shortlisted, the next thing to tick off is the background checks. Companies usually refer to ex-employers and referees for validation. Most often than not we tend to look them up on LinkedIn to verify their corporate information
What Is A Botnet?
Malicious actors build botnets by infecting connected devices with malware and then managing them using a command and control server. Botnet architecture has evolved over time. the bot herder (the person controlling the botnet) to perform all control from a remote location, which obfuscates their traffic.
Social Engineering : Why You are at Risk
Networks were typically built up to guard information from external access, which is why firewalls and similar safeguards protect one’s network from unverified software and communications attempting the network.
Zero Trust Architecture 101
Networks were typically built up to guard information from external access, which is why firewalls and similar safeguards protect one’s network from unverified software and communications attempting the network.
CSRF Protection 101
Cross Site Request Forgery (CSRF) is an attack where the hacker manipulates the user to carry out the attack by using the legitimate URL and the hosted website.