The Dangers of Ransomware Through File-Sharing Software

Author(s):

Jacob Fox, Tech Evangelist, Cobalt

Dangers of File-Sharing Software

Ransomware is an ever-growing threat to businesses and consumers alike. According to Jeff Thull, the Senior Director of Threat Research at Cisco, “Now we are dealing with cyber-based extortionists that seek to hide their identity through powerful anonymization tools by going after personal information.” Once infected, ransomware can render your files inaccessible. Unless the attackers … Read more

Best Practices for Countering Social Engineering Attacks

Author(s):

Emmanuel Akin-Ademola, Technical Writer,

social engineering

Ninety-eight percent of all cyber-attacks are variations of social engineering. This implies that businesses must constantly invest in cutting-edge approaches for their cybersecurity as cybercriminals invent new ways of exploiting organizations’ vulnerabilities. Unlike other forms of cyber-attacks, social engineering focuses on humans — this brings serious problems because humans are the weakest link in the security chain. … Read more

Culturing a Healthy SOC Environment with AI

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

AI and SOC

Security Operation Center, also known as SOC, plays a critical role in integrated security intelligence technologies and improving the overall organizational cybersecurity. SOC primarily focuses on defending against potential cyber threats, continuously monitoring networks, and developing incident response reports. It functions like a team possessing relevant knowledge and skills and operating from well-defined processes supporting … Read more

Is Online Shopping Safe? 6 Risks on E-Commerce Platforms

Author(s):

Leo Corado, Freelancer, SurfShark

Online shopping

E-commerce is a rapidly growing sector, expected to see over 8 trillion sales globally by 2026. With such bountiful rewards, it’s no surprise that scammers and hackers jump on the opportunity to steal funds and data from shoppers. But how do these cybercriminals scam their e-commerce users? In this article, we’ll discuss the risks you … Read more