Cybersecurity

Data Breach Hits Malaysian University, Personal Data Leaked

A massive data breach that had reportedly hit a prominent Malaysian university has resulted in personal data of over one million people being leaked online. As per reports, personal details of over one million students and alumni of the UiTM Universiti Teknologi Mara have been breached and leaked online. This breach has reportedly occurred between

[ Read More ]

Cyber Security Hacking Tools You Must Be Aware Of

Not all cyber attacks are caused by newly developed tools, nor by advanced hackers using zero-day exploits. Many of the hacks occur due to the use of off-the-shelf hacking tools and exploits, which are available for download on the Internet today. A pattern for use of off-the-shelf hacking tools was detected 5 African states: Ivory

[ Read More ]

How to Secure Your ACS (Access Control System)

We live in a world where cybercrime has become a very common thing. Cybercriminals, who are turning more and more sophisticated with evolving technology, are always on the lookout for security holes that they can exploit to access systems, devices and networks to steal all kinds of data, ranging from corporate data to sensitive personal

[ Read More ]

18-25 Age Group Poses Great Threat to Business Cybersecurity

Which age-group poses the greatest threat to business cybersecurity? Well, a recent study points out that it’s the millennials- those in the 18-25 age group who tend to break basic security rules. A new research report from identity governance platform SailPoint states that nearly 90 percent of youngsters in the 18-25 age group break basic

[ Read More ]

Discussing Cybersecurity Best Practices in the New Year

2019 is just over a week old; we at The Threat Report take this occasion to discuss cybersecurity best practices, stressing on important aspects including importance, training et al. Let’s begin with a proper introduction. Well, as part of the introduction, we’d like to point out that for any business today, especially those that depend

[ Read More ]

Cybersecurity Tips for Protecting Organizations in 2019

The world of cybercrime is changing fast; it’s ever-evolving. As we step into the new year, we need to discuss things that need to be done, to ensure better cybersecurity, for individuals, for organizations and businesses. In this piece, we discuss some basic tips that could help organizations protect themselves against cyberattacks in 2019. Here

[ Read More ]

How To Minimize The Chance Of Becoming The Next Victim of Cyber Attacks?

The world has breached the very limit of the Internet Protocol version 4 address, AKA IPv4. This addressing scheme enables around 4.3 billion distinct devices to be connected to the Internet at the same time. However, as mentioned by the father of the Internet, Vint Cerf, IPv4 was not designed as a ‘production’ protocol but

[ Read More ]

Idaho National Laboratory: A Covert Anti-Cybercrime Lab

The United States as a nation knows how to maximize its resources, that is one of the main advantages she has compared to other industrialized nations. The ‘double duty’ of a government agency or installation is usually done covertly in order not to attract attention, both internal and external. As cybersecurity defense needs grew not

[ Read More ]

Iranian Government Accused of Phishing-Based Cyber Espionage

State-sponsors hackers have been in the news for quite a while. With former NSA contractor, Edward Snowden exposed NSA’s Prism operation in 2012, basically a global espionage. The Lazarus group allegedly connected with North Korean regime, accused of being responsible for the Sony Pictures of America data breach of 2014 and WannaCry ransomware attacks of

[ Read More ]

Saipem after the Unauthorized Remote Access Incident

Saipem, the contractor of two big oil refineries, Duqm (based in UAE) and Saudi Aramco (headquartered in Saudi Arabia) has publicly announced that it was a victim of a cyber attack last December 10, 2018. Unauthorized users were able to penetrate the servers, but fortunately, failed to get a hold of the data stored on

[ Read More ]