cyberattacks

MicroStrategy’s X account hacked as users lose $440,000

MicroStrategy Inc., renowned for its significant Bitcoin holdings, recently fell victim to a phishing attack, resulting in unsuspecting users losing approximately $440,000. Bloomberg reported that the breach occurred on a Monday in Asia and was orchestrated by a skilled attacker who strategically placed and subsequently deleted a deceptive post on MicroStrategy’s X page. The post …

MicroStrategy’s X account hacked as users lose $440,000 Read More »

Verisign employee accidentally compromises personal data of 63,000 colleagues

Verisign, a prominent telecommunications service provider in the US, recently disclosed a significant data breach affecting over 63000 individuals, mostly its employees. The breach, discovered on September 21, 2023, was only detected three months later, on December 12, 2023, and has impacted 82 people from Maine one of the easternmost states in the United States. …

Verisign employee accidentally compromises personal data of 63,000 colleagues Read More »

Clickjacking: Understanding and Preventing it

In the ever-evolving landscape of cybersecurity threats, Clickjacking is a deceptive technique that cybercriminals employ to trick users into clicking something different than what they perceive they are clicking on. Clickjacking is also known as a user interface (UI) redressing attack. When users click something, they think is safe, the hidden UI performs a different …

Clickjacking: Understanding and Preventing it Read More »

The Human Factor of Cyber Security

In the realm of cybersecurity, it is often said that humans are the weakest link. Despite the advancements in technology and sophisticated security measures put in place, the actions and behaviours of people can still leave organizations vulnerable to Human cyber threats. Human vulnerabilities in cyber security stem from factors such as lack of awareness, …

The Human Factor of Cyber Security Read More »

Password Security Measures

Passwords have been around since the dawn of the computer age and they remain the primary means of protecting online accounts and personal information. As the number of online transactions and data breaches continue to increase, it is more important than ever to choose and use strong passwords. A strong password is a combination of …

Password Security Measures Read More »

The People, Process, and Technology of Cybersecurity

The COVID-19 pandemic generated an increase in cyber threats. According to a security magazine, Ransomware attacks rose by 92.7% in 2021 whilst comparison to 2020. With an increase in the use of digital technology comes an increase in cyber threats and with each passing day, such threats are evolving, and the need for constant attention …

The People, Process, and Technology of Cybersecurity Read More »

What is Cybersecurity Risk?

According to NIST SP 800-60 volume 1 revision 1, Cybersecurity risks relate to the loss of confidentiality, integrity, or availability of information, data, or information (or control) systems and reflect the potential adverse impacts on organizational operations (i.e., mission, functions, image, or reputation) and assets, individuals, other organizations, and the Nation. Cybersecurity risk is the probability of exposure, …

What is Cybersecurity Risk? Read More »

NIST Incident Response Life Cycle

The NIST 800-61 revision 2 standard provides guidelines for incident handling, especially for analyzing incident-related data, and determining the appropriate response to each incident. The guidelines can be followed independently of particular hardware platforms, operating systems, protocols, or applications. Organizations that need to implement the NIST Incident Response Life Cycle, must first establish a computer …

NIST Incident Response Life Cycle Read More »