[ad_1] The Socio-Economic Rights and Accountability Project (SERAP) and the Nigerian Guild of Editors (NGE) have urged President Bola Tinubu and the National Assembly to repeal Cybercrime (Prohibition, Prevention, etc.) Act, citing its use by authorities to harass journalists, bloggers, activists, and critics across Nigeria. Speaking at a press conference in Lagos on Saturday to...Read More
[ad_1] The Federal Bureau of Investigation’s Assistant Director of Cyber Bryan Vorndran describes … More ransomware as the agency’s “most high-profile cybercriminal threat.” getty Ransomware continues to dominate headlines as one of the most pervasive threats to businesses across the globe. Ransomware attacks have grown in complexity and audacity, targeting various industries and causing substantial...Read More
[ad_1] The Socio-Economic Rights and Accountability Project (SERAP) and the Nigerian Guild of Editors (NGE) have urged President Bola Tinubu to review the Cybercrime Act and other restrictive laws. They called for an assessment of these laws for potential restrictions on free speech and press freedom in Nigeria. The general secretary of NGE, Iyobosa Uwugiaren,...Read More
[ad_1] The Brief The hacking group Qilin claims to have 150 gigabytes of sensitive data from Cobb County’s servers, including autopsy photos and social security cards, and plans to release it if a ransom is not paid. Cobb County refuses to negotiate with the hackers, advising residents to freeze credit, change passwords, and use two-factor...Read More
[ad_1] Triggers of global cybersecurity debates This section delves into the incidents and themes that have catalyzed widespread discussions. Figure 2 highlights certain events that stand out as key triggers for expansive cybersecurity debates as a function of time. Fig. 2: Number of comments per month over the years for topics cyber attacks, DdoS attacks,...Read More
[ad_1] The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) is offering a range of summer internship programs for students in grades 3 through 12 who are interested in exploring careers in cybersecurity. Applications for all programs are due by 5 p.m. on May 9. For middle school students in grades 6 to 8, the...Read More
[ad_1] Over the past year, a clear pattern has emerged across the threat landscape: ransomware operations are increasingly relying on compartmentalized affiliate models. In these models, initial access brokers (IABs) [6], malware loaders, and post-exploitation operators work together. Due to those specialization roles, a new generation of loader campaigns has risen. Threat actors increasingly employ...Read More
[ad_1] Hackers say they’ve stolen 150GB of sensitive information. County officials remain tight-lipped as residents wonder if their personal data is at risk. 🚨 Why It Matters: Your personal information could be compromised if you’ve interacted with Cobb County services. This attack threatens to disrupt essential government functions that thousands of residents depend on daily....Read More
[ad_1] AI isn’t just changing the paradigm of cybercrime—it’s creating a new, larger attack surface with no rules. Just as culture eats strategy for breakfast, generative AI is swallowing up automated phishing campaigns, deepfake fraud, malware creation and much more at an unprecedented scale—fueling a new era of cyber-attacks. In 2024 alone, credential phishing...Read More
[ad_1] Data breaches have become alarmingly common and costly, putting sensitive information at risk. In fact, the number of data breaches in the United States jumped from 447 in 2012 to over 3,200 in 2023. Even firms entrusted with managing personal information are not immune. The latest example is VeriSource Services, a Texas-based employee benefits...Read More