Cybersecurity Insiders

Cybersecurity Insiders

Online Audio and Video Media

Baltimore, MD 1,769 followers

The online community for cybersecurity professionals

About us

Cybersecurity Insiders is an online community of over 700,000 information security professionals across the world. We started with the LinkedIn group "Information Security Community" over 15 years ago and have expanded to become your source for everything related to cybersecurity - connecting people, opportunities, and ideas. Join our Cybersecurity Insiders newsletter for the latest cybersecurity news, solutions, and best practices: https://www.cybersecurity-insiders.com/join-cybersecurity-insiders/

Website
https://www.cybersecurity-insiders.com
Industry
Online Audio and Video Media
Company size
11-50 employees
Headquarters
Baltimore, MD
Type
Privately Held
Founded
2015
Specialties
cybersecurity, online community, marketing, news, research, webinars, security, and information security

Locations

Employees at Cybersecurity Insiders

Updates

  • View organization page for Cybersecurity Insiders, graphic

    1,769 followers

    Congratulations to all winners of the 2024 Cybersecurity Excellence Awards! https://lnkd.in/dv4_mJv We are thrilled to recognize and celebrate the achievements of all recipients in the 2024 Cybersecurity Excellence Awards! Each award recipient has been selected based on their unique contributions to excellence, innovation and leadership in information security. Visit the Cybersecurity Excellence Awards site to view all recipients of the 2024 Cybersecurity Excellence Awards in their respective award groups: https://lnkd.in/gvuVnsPb

    • No alternative text description for this image
  • View organization page for Cybersecurity Insiders, graphic

    1,769 followers

    The Growing Cyber Threat to Weather Predictions https://lnkd.in/eQ7rMAwK In an increasingly interconnected world, where technology drives every facet of life, even the weather predictions we rely on may not be immune to cyber threats. The integration of advanced computer systems and data analytics has revolutionized meteorology, enabling more accurate forecasts and better preparedness for severe weather events. However, this dependency on technology also exposes weather prediction systems to potential cyberattacks, which could have far-reaching consequences. Vulnerabilities in Weather Prediction Systems Modern weather forecasting relies heavily on complex models that process vast amounts of meteorological data collected from satellites, weather stations, and other sources. These models require continuous updates […]

    The Growing Cyber Threat to Weather Predictions

    The Growing Cyber Threat to Weather Predictions

    https://www.cybersecurity-insiders.com

  • View organization page for Cybersecurity Insiders, graphic

    1,769 followers

    Details of AT&T data breach and 1TB data steal belonging to Disney https://lnkd.in/etiV9pGx Over the past few days, AT&T, a major American telecom company, has made headlines due to a sophisticated cyber-attack that exposed the details of over 109 million mobile customers dating back to 2022. According to updates received by our Cybersecurity Insiders, the data breach occurred in 2022 and affected customers who used AT&T’s telecom services between March and October of that year. This includes users of their cellular network, virtual mobile network, and landline services. Fortunately, the hackers did not access sensitive information such as social security numbers (PII). As of now, there is no evidence that the information gleaned […]

    Details of AT&T data breach and 1TB data steal belonging to Disney

    Details of AT&T data breach and 1TB data steal belonging to Disney

    https://www.cybersecurity-insiders.com

  • View organization page for Cybersecurity Insiders, graphic

    1,769 followers

    How to defend against zero-click attacks https://lnkd.in/er89YNXB Cyberthreats never stay the same. Just as fast as cybersecurity providers shut down an attack vector or develop a fix for a particular form of attack, cybercriminals develop new exploits and tactics to burrow their way in. One major newer attack type is the zero-click attack, which can create a devastating impact from the smallest user action. Businesses need to ensure they’re aware of how these attacks work – and what they can do to protect themselves. Zero-click attacks can rapidly compromise social media accounts or other systems through innocuous-looking messages. These insidious malware attacks are transmitted through DMs within […]

    How to defend against zero-click attacks

    How to defend against zero-click attacks

    https://www.cybersecurity-insiders.com

  • View organization page for Cybersecurity Insiders, graphic

    1,769 followers

    How to safeguard oneself from sectortion attacks online https://lnkd.in/gn3wsTYp Safeguarding oneself from sectortion attacks online is crucial in today’s digital age where cyber threats continue to evolve. Se*tortion, a form of blackmail where perpetrators threaten to re-lease intimate images or videos unless demands are met, can have devastating consequences for victims. Here are practical steps individuals can take to protect themselves from such attacks: 1. Awareness and Education: Understand what se$tortion is and how it manifests. Recognize that perpetrators use various tactics, such as phishing emails, social engineering, or exploiting vulnerabilities in online interactions, to obtain compromising material. 2. Strong Passwords and Security Practices: Use strong, unique passwords for \[…\]

    How to safeguard oneself from sectortion attacks online

    How to safeguard oneself from sectortion attacks online

    https://www.cybersecurity-insiders.com

  • View organization page for Cybersecurity Insiders, graphic

    1,769 followers

    Cloud Security becoming a priority for businesses in 2024 https://lnkd.in/gSyY4bc5 With the rise of digital transformation and widespread adoption of cloud-based solutions, organizations are increasingly turning to these platforms to meet their evolving needs. However, the surge in data breaches within cloud data centers has sparked significant concern among security professionals. This uncertainty has left many grappling with decisions about cybersecurity budget allocations in upcoming sessions. The 2024 Thales Cloud Security Study identifies two primary concerns that, if addressed by Cloud Service Providers (CSPs), could alleviate many of these anxieties: human error and mis-configurations. These factors are responsible for 28% of breaches, resulting in data leaks and application disruptions. Based […]

    Cloud Security becoming a priority for businesses in 2024

    Cloud Security becoming a priority for businesses in 2024

    https://www.cybersecurity-insiders.com

  • View organization page for Cybersecurity Insiders, graphic

    1,769 followers

    CDK Global faced second ransomware attack https://lnkd.in/g2YMqq_M CDK Global, a prominent provider of software solutions for automotive sales and services across 15,000 dealerships, recently faced significant disruptions due to alleged ransomware attacks. Reports indicate that the attacks, attributed to the Black Suit file encrypting malware group, initially targeted the company, causing temporary service disruptions. Shortly after the first incident, media outlets reported a second ransomware attack targeting CDK Global while recovery efforts from the initial breach were still ongoing. Lisa Finney, a spokesperson for the company, confirmed the occurrence of the second attack and assured that investigations were underway. Law enforcement agencies were promptly notified, and security […]

    CDK Global faced second ransomware attack

    CDK Global faced second ransomware attack

  • View organization page for Cybersecurity Insiders, graphic

    1,769 followers

    Create order from chaos https://lnkd.in/g3uXs6rM The task of managing and interpreting vast amounts of data is akin to finding a needle in a haystack. Cyber threats are growing in complexity and frequency, demanding sophisticated solutions that not only detect but also prevent malicious activities effectively. Cybereason’s MalOp (Malicious Operations) is designed to tackle this challenge head-on, transforming chaos into order by providing comprehensive, real-time insights into security threats. Chaos in cybersecurity Cybersecurity teams are often overwhelmed by the sheer volume of alerts and data they must sift through daily. Traditional security systems generate numerous alerts, many of which are false positives, leading to alert fatigue […]

    Create order from chaos

    Create order from chaos

    https://www.cybersecurity-insiders.com

  • View organization page for Cybersecurity Insiders, graphic

    1,769 followers

    LockBit ransomware spinoff variant targets Indonesia Govt data centers https://lnkd.in/gB6A_J6c In recent days, Indonesia has been grappling with significant disruptions to airport services and banking operations following a ransomware attack attributed to a variant known as Brian Cipher, a spinoff of the notorious LockBit ransomware. This incident has resulted in widespread outages affecting essential services, including immigration and IT systems across 210 government organizations. Initial investigations suggest that the hackers behind the attack have successfully exfiltrated a portion of data and are demanding a ransom of $8 million within a two-day deadline. Failure to comply threatens the release of stolen data on the dark web. The impact has been particularly […]

    LockBit ransomware spinoff variant targets Indonesia Govt data centers

    LockBit ransomware spinoff variant targets Indonesia Govt data centers

  • View organization page for Cybersecurity Insiders, graphic

    1,769 followers

    Top 10 Industries Most Vulnerable to Cyber Attacks https://lnkd.in/gbi69n6y Cybersecurity threats continue to pose significant challenges across various industries, with certain sectors bearing the brunt of frequent and severe cyber attacks. Here’s a closer look at the top 10 industries most vulnerable to cyber attacks: 1. Healthcare: The healthcare industry holds vast amounts of sensitive patient data, making it a prime target for cyber-criminals seeking to exploit vulnerabilities in medical systems and databases. 2.  Financial Services: Banks, insurance companies, and financial institutions are lucrative targets due to the valuable financial information they possess. Cyber attacks can range from data breaches to ransomware attacks aiming for financial gain. 3. Government: […]

    Top 10 Industries Most Vulnerable to Cyber Attacks

    Top 10 Industries Most Vulnerable to Cyber Attacks

    https://www.cybersecurity-insiders.com

Similar pages

Browse jobs