5 New Challenges for Cybersecurity in 2022

Introduction Cybersecurity is a constantly evolving field. The way we protect our systems, devices, and data has changed dramatically over the past decade and it’s likely to change even more in the next few years. In this article, we’re going to take a look at five of the biggest challenges that organizations will face when […]

Comparison study of 10 leading pharma companies coming out in October

The goal of the data and cybersecurity exposure assessment to be published in October, 2022, by Cyber Intel Matrix, is to give an objective picture of current detected vulnerabilities, and through it a sectoral overview of typical vulnerabilities, weaknesses, and possible future threats. The study examines eight main perspectives of each company’s infrastructure: Account Takeover […]

What are the 6 Phases in a Cyber Incident Response Plan?

Introduction Cybersecurity is a growing concern for businesses. In a recent survey, 74% of organizations reported experiencing a cybersecurity incident in the last year alone. With so many cyber incidents occurring today, it’s essential to have an incident response plan in place before an attack occurs. It’s important to understand what these phrases mean and […]

How To Create An Effective Cybersecurity Policy

Introduction Cybersecurity is a serious matter for any company, but especially so if your business deals with sensitive information or assets. While there are many things to think about when it comes to implementing a cybersecurity policy, here are some of the most important ones that will help ensure you’re doing everything you can to […]

What is cybersecurity?

The term “cyber” comes from cyberspace, which refers to all electronic information that exists in digital form. This includes data stored on hard drives, memory cards, flash drives, and other storage devices. The field of cybersecurity is constantly evolving, and so are the threats it faces. This means that cybersecurity professionals must remain aware of […]

5 reasons why businesses need Network Firewall Security

Introduction The world of business is changing. Now more than ever, we’re all connected online and we’re facing new threats on a daily basis. A small business firewall allows you to protect your valuable information from security threats while also giving you the ability to monitor network activity and set up rules for proper usage. […]

Google, Mandiant say zero-day numbers reached all-time highs in 2021

Google and Mandiant released reports this week saying the number of disclosed and exploited zero-days reached record highs in 2021. Mandiant said it identified 80 zero-days exploited in the wild, more than double the record volume they saw in 2019. The term zero-day refers to newly-discovered vulnerabilities in which a vendor has zero days to […]

First phase of ‘Hack DHS’ finds over 120 vulnerabilities

Indianapolis – Circa August 2018: Logo and seal of the United States Department of Homeland Security. DHS runs Immigration and Customs Enforcement (ICE) The initial leg of the Homeland Security Department’s first-ever bug bounty program uncovered more than 120 cybersecurity vulnerabilities in some of its external systems, the agency announced on Friday. More than 450 […]

New Log4j attacks target SolarWinds, ZyXEL devices

Image: Possessed Photography // Unsplash Cybercriminals looking to capitalize on the Log4Shell vulnerability are attacking devices from SolarWinds and ZyXEL that are known to have used the Log4j library inside their software, according to two reports published on Wednesday by Microsoft and Akamai. The most urgent of these attacks are those spotted by Microsoft, which said it […]

New MoonBounce UEFI bootkit can’t be removed by replacing the hard drive

Security researchers from Kaspersky said on Thursday that they had discovered a novel bootkit that can infect a computer’s UEFI firmware. What makes MoonBounce—the name they gave the bootkit—special is the fact that the malware doesn’t burrow and hide inside a section of the hard drive named ESP (EFI System Partition), where some UEFI code typically […]