Telegram: A Thriving Hub of Criminal Activity

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Telegram

Secure messaging platforms have long since been in the middle of ethical debates, primarily over their use. They indeed allow users a chance to attain the online security they deserve and help protect personal information from data snoopers. In contrast, it is also true that these platforms can become the hub of cybercriminal activity due … Read more

Culturing a Healthy SOC Environment with AI

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

AI and SOC

Security Operation Center, also known as SOC, plays a critical role in integrated security intelligence technologies and improving the overall organizational cybersecurity. SOC primarily focuses on defending against potential cyber threats, continuously monitoring networks, and developing incident response reports. It functions like a team possessing relevant knowledge and skills and operating from well-defined processes supporting … Read more

The Rising Threat of Mobile Phishing Attacks: Why Your Organization Needs to Prepare

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Mobile Phishing Attacks

The growth of mobile devices in the workplace has turned mobile phishing into a significant opportunity for malicious actors, and it’s therefore a growing concern for organizations. With mobile phishing, the attacker sends links to phishing websites via SMS messages, where they ask for your credentials. One study estimates that 75% of phishing websites specifically … Read more

Best Identity and Access Management (IAM) Practices for DevSecOps

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Best IAM Practices

Humans have long been the weakest link in an organization’s cybersecurity infrastructure. Statistics reveal that human errors such as misconfigurations, secret leakage, and bad data hygiene cause 95% of data breaches. Hackers rarely find their way into a system through brute force attacks; in fact, the most commonly known strategy is phishing attacks that help … Read more