Cyber Security Blog

Today, business operations relying on technology are vulnerable to privacy and security threats. While advanced technologies can help, they aren't sufficient to defend against sophisticated cyberattacks. Cybercrime is rising, and so is the need for robust security measures in business processes and employees.    However, achieving this can be challenging, so companies turn to frameworks to ensure they follow the best practices for information security. This is...

Read More

As mobile and touchless payment methods become a norm in today's technology-driven landscape, vendors working in this industry become a prime target of cybercriminals. Data breaches can be costly and cause a business financial loss as well as a loss of reputation. According to Statista, e-commerce losses to online payment fraud were estimated at $41 billion globally.    To defend against such attacks, five major credit card...

Read More

The world's leading information security standard, ISO/IEC 27001, was updated on October 25, 2022. While the new update doesn't bring any major changes, it's essential to study them closely.    The article explores the key updates in the ISO 27001:2022 standard and how it differs from ISO 27001:2013. But first, let’s discuss why the update took place.    Why Was There a Need to Update ISO 27001:2013?   Cyberattacks on businesses...

Read More

A group of hackers, known for creating the BlackRock and ERMAC Android banking trojans, has released another malware named Hook. Hook can be rented for $7,000 per month and has new abilities to access files on an infected device and create a remote interactive session. ThreatFabric, a cybersecurity firm, has described Hook as a new version of the ERMAC malware and includes all the capabilities...

Read More

As we move forward in 2023, cybersecurity continues to be a  top concern for many CIOs around the globe. The cybersecurity landscape is fast-changing, stressful, at the same time, downright scary. Several factors are contributing to an increase in cybersecurity threats; the ongoing Russia-Ukraine war, rising poverty, and food insecurity play a significant role.   With an ever-evolving threat landscape, it becomes challenging to stay ahead of...

Read More

With cyber threats becoming more advanced and sophisticated, organizations also need a sophisticated approach to compliance and cybersecurity. During the third quarter of 2022, almost 15 million data records were compromised due to cyberattacks. To help organizations protect against cyberattacks, counties have implemented different regulations. One such standard is SAMA Cybersecurity Framework.    However, in this era of technology, a manual approach to SAMA compliance is time-consuming,...

Read More