{"id":4500,"date":"2021-11-17T14:35:00","date_gmt":"2021-11-17T09:05:00","guid":{"rendered":"https:\/\/www.tikaj.com\/?p=4500"},"modified":"2021-11-17T21:26:03","modified_gmt":"2021-11-17T15:56:03","slug":"cybersecurity-bi-weekly-roundup","status":"publish","type":"post","link":"https:\/\/www.tikaj.com\/blog\/cybersecurity-bi-weekly-roundup\/","title":{"rendered":"Cybersecurity Bi-weekly Roundup: Week of 14th November"},"content":{"rendered":"\n
A bi-weekly roundup of the latest cybersecurity news and research<\/strong><\/p>\n\n\n\n Halfway down the week and we\u2019ve got you covered till the weekend about all the nitty-gritty in the world of cybersecurity!<\/p>\n\n\n\n The attackers are trying their best to break Apple’s legacy. We all know that Apple is best known for its high-end security but with an increasing number of zero-day vulnerabilities being exploited by attackers, security has become a myth for Apple users this time. To everyone who thinks “I can be careless, who will attack me”, attackers broken myth for you as this time they went for mass spreader rather than going for a targetted attack.<\/p>\n\n\n\n Read More<\/a><\/p>\n\n\n\n A pair of PlayStation 5 breaches show the consoles don\u2019t have protection from attackers taking over its most basic functions. Both exploits were posted on Twitter on Nov. 7 without disclosure to Sony or specifics, but they nonetheless signal potential security problems to come for the gaming giant. FailOverFlow, which has already earned a reputation as a prolific PlayStation jailbreaker group, posted a Nov. 7 tweet that appeared to contain the PS5 firmware symmetric root keys.<\/p>\n\n\n\n Read More<\/a><\/p>\n\n\n\n “A Fishing website was Phished”, no puns intended you read it right. The hackers are stooping down their levels as recently they attacked a fishing website and redirected it to an explicit website, causing organization reputational and financial loss and users a lot of embarrassment. The company mentioned: The hackers’ motive was pretty clear that they wanted a ransom, though no loss of financial credentials happened.<\/p>\n\n\n\n Read More<\/a><\/p>\n\n\n\n CyberSecurity is no more a delicacy rather an essential meal and as we move forward with the cybersecurity roundup here is a quick 10 ways guide to protect yourself from Ransomware attacks. Ransomware attacks not only causes financial loss but also led to significant downtime and the good news is this guide will help you to be more vigilant online and #BeSecure every time you’re online. Your organization’s powers should be in your hand, own it and flip the table for the threat actors.<\/p>\n\n\n\n Read More<\/a><\/p>\n\n\n\n Babuk with its new “Tortilla” variant exploited the Microsoft Exchange ProxyShell vulnerabilities, this time the aim was to inflict the vulnerable servers. Though we suggest to everyone that staying vigilant can solve most of your cybersecurity problems and implementing a multi-layered defence system will also help in creating a secure environment, it is always better to detect the threats in the early stages, so that effective steps can be taken to stop the infection chain.<\/p>\n\n\n\n Read More<\/a><\/p>\n\n\n\n Since the onset of the pandemic, many businesses shifted online without having a clear picture of when, which made cybersecurity a booming concern, 18 months down the line and globally millions are still working remotely. Hybrid working became a new norm, though the business didn’t stop during the pandemic this introduced a range of endpoint security challenges that must be overcome to protect employees and employers.<\/p>\n\n\n\nHackers Targeted Apple Devices in Hong Kong for Widespread Attack<\/h2>\n\n\n\n
Back-to-Back PlayStation 5 Hacks Hit on the Same Day<\/h2>\n\n\n\n
Fishing gear seller caught in hacker’s net<\/h2>\n\n\n\n
As we move with the cybersecurity roundup, here is a guide for you: Top 10 Cybersecurity Best Practices to Combat Ransomware<\/h2>\n\n\n\n
\u2018Tortilla\u2019 Wraps Exchange Servers in ProxyShell Attacks<\/h2>\n\n\n\n
How to manage endpoint security in a hybrid work environment<\/h2>\n\n\n\n