Operations | Monitoring | ITSM | DevOps | Cloud

Cyberattacks

Diagnostic Artificial Intelligence Models Can Be Tricked By Cyberattacks

Researchers discovered that diagnostic artificial intelligence models used to detect cancer were fooled by cyberattacks that falsify medical images. Diagnostic artificial intelligence (AI) models hold promise in clinical research, but a new study conducted by University of Pittsburgh researchers and published in Nature Communications found that cyberattacks using falsified medical images could fool AI models.

How to Protect Against Ransomware Attacks

Business leaders today are being pushed toward the rapid adoption of technology, especially in the wake of the COVID-19 pandemic – so much so that the term ‘digital transformation’ became a major trend. While tech is vital to the success of forward-thinking companies, many investments made in the name of digital transformation are revealed to be purchases that were “technology for the sake of technology”.

3 Ways To Prevent Cyber Security Threats When Marketing Online

No matter what type of business you operate, cyberattacks can be destructive to your company. Even though you think your Information Technology (IT) team should be handling any cybersecurity issues, it doesn't have to always go that way. All the departments should take a proactive role in safeguarding the privacy of your business.

Update on the Nobelium APT Attack Group

If you’re like me, you started your week by reading the Microsoft blog about Nobelium, an advanced-persistent-threat (APT) group that was actively targeting cloud service providers (CSPs) and managed services provider (MSPs) in a recent wave of supply chain attacks. Personally, I wasn’t terribly surprised. We all know by now that MSPs have a bullseye on them for adversaries wishing to target the supply chain. What’s different about this attack is the motive.

Cyber Security Protocols Your Online Business Needs

According to a recent report by CNBC, only 14% of businesses have adequate safeguards against potential cyberattacks. The finding is alarming considering that businesses of all sizes lose close to $200,000 annually due to cyber-related attacks. Ensuring that you have in place water-tight cybersecurity protocols for your online business is a security measure you cannot overlook.

5 times domains have been hijacked

It’s a common belief that once we purchase a domain, it’ll be ours for as long as we like. Big mistake. Mainly because there are genuine threats to your domain online that mostly go unthought of. For example, hackers can gain access to your system and take your domain for ransom or cause malicious damage to you and your business. Surprised? Well, we have 5 examples of exactly when this has happened, and how hackers have managed to gain access to domains and cause mass disruption.

Cyber Attacks 'Be Cyber Smart and Avoid Collateral Damage'

Cybersecurity Awareness Month, now in its 18th year, is an opportunity to highlight the continually escalating conflict that is, for the most part, hidden from the public – unless it becomes media-worthy. Every day, those who are responsible for security (IT staff, threat and security analysts to CISOs) face new challenges. Digital transformation has accelerated at hyperspeed because organizations are focused on adjusting to COVID-19 disruptions.

Ways to Secure Your Chatbot Against Attacks

Chatbots and Virtual Assistants (VAs) are becoming increasingly popular as businesses accommodate the diverse needs of the digital industry. These tools give companies, no matter how small, the ability to answer their audiences, provide assistance, and solve problems, driving traffic during off-hours and with minimal staff. As a result, chatbots are one of the most effective features you can add to your website. And yet, chatbots present a risk.

What Is a Traffic Analysis Attack?

The times when it was enough to install an antivirus to protect yourself from hackers are long gone. We actually don’t hear much about viruses anymore. However, nowadays, there are many different, more internet-based threats. And unfortunately, you don’t need to be a million-dollar company to become a target of an attack. Hackers these days use automated scanners that search for vulnerable machines all over the internet. One such modern threat is a traffic analysis attack.

Why DDoS remains a bigger threat than ever in the age of the cloud

Distributed denial of service attacks are one of the most established, and oldest, modes of cyber attack, dating back at least a quarter of a century to the mid-1990s. The cloud, on the other hand, is one of the newer revolutions in the tech world. While the term "cloud computing" was actually coined at approximately the same time as the inaugural DDoS attack, it is only over the past several years that the cloud has truly become a ubiquitous part of the computing landscape.