Backup-As-A-Service, Passwords and Chrome’s Vulnerabilities
Home > Tech > Weekly Roundups

Backup-As-A-Service, Passwords and Chrome’s Vulnerabilities

Photo by:   Image by Pete Linforth, Pixabay
Share it!
Tomás Lujambio By Tomás Lujambio | Journalist & Industry Analyst - Thu, 09/21/2023 - 09:56

Cybersecurity concerns remain a significant barrier to organizations' technology investments. However, artificial intelligence is currently being used to enhance vishing attacks and Google Chrome’s browser presents easily exploitable software vulnerabilities. 

In other news, Alcion’s backup-as-a-service platform proves its worth as a resilient cybersecurity measure, effectively securing organizations’ data. Similarly, Ikusi enhances cybersecurity with its password management services, providing an extra layer of digital security to its clients. 

This is the week in CyberSEC:


Cybersecurity Landscape

Alcion’s Backup -As-A-Service Platform Raises US$21 Million

As more organizations migrate their business operations to the cloud, their attack surface increases, exposing them to a wide range of malware variants. Furthermore, as the value of these organizations grows, so does their appeal among cybercriminals willing to demand exorbitant fees for the recovery of vital data. This threat landscape has incentivized cybersecurity startups to focus on managing and securing cloud-stored data at scale, a market offer that has started to gain traction in the industry.

Cybersecurity Concerns Hinder Technological Investments 

The digital transformation catalyzed by the COVID-19 pandemic has prompted organizations worldwide to integrate emerging technologies into their business processes. Nevertheless, a study conducted by HPE Aruba Networks has unveiled that cybersecurity concerns remain a significant barrier to organizations' technology investments. The study revealed that multiple organizations fear that migrating to the cloud could expose their operation to heightened security threats, leading many to grapple with the delicate balance between innovation and risk.

ESET: Cybercriminals Exploit Chrome Browser Vulnerabilities 

Safeguarding internet browsers against potential cyber threats takes on paramount importance to ensure user privacy and security. Beyond facilitating users' online journeys, browsers store highly sensitive data, including passwords, cookies and delicate information such as credit card details. However, Google Chrome's browser registered a 50% increment in malware attacks in comparison to prior years, according to a study conducted by WatchGuard during 2022. In response to this sudden upswing in cyberattacks, ESET recommends the implementation of a range of security solutions to fortify user data protection.

Ikusi Enhances Cybersecurity with Workforce Password Management 

Despite investing in cutting-edge technology to enhance digital security, financial organizations remain vulnerable to mistakes made by employees lacking cybersecurity awareness. For example, employees with low IT expertise tend to use weak passwords, presenting a major threat to financial organizations that hold access to web applications containing confidential and sensitive information. To address this concern and mitigate the security risks associated with easily accessible passwords, Ikusi has developed a digital solution known as Workforce Password Management.

Artificial Intelligence Enhances Vishing Attacks

Various IT specialists have recently referred to artificial intelligence as a double-edged sword. In cybersecurity, while AI can identify potential cyberattacks by detecting anomalous patterns, it also empowers cybercriminals to develop more sophisticated attacks and convincingly replicate a user's voice for scamming purposes.


Executive Perspective

Navigating Cybersecurity Challenges with NIST CSF, vCISO Support

In an ever-evolving digital landscape, the role of Chief Information Security Officers in safeguarding valuable assets and reputation is paramount. The National Institute of Standards and Technology Cybersecurity Framework emerges as the strategic compass, offering a versatile toolkit with five core functions: identify, protect, detect, respond and recover. This framework empowers CISOs to formulate a comprehensive cybersecurity approach aligned with organizational goals. The forthcoming CSF 2.0 introduces the "governance" function, fostering a holistic security posture, leadership engagement, enhanced risk management, regulatory adherence, transparent communication and performance evaluation. 

Where Do Hackers like Us Come From? The World of Ethical Hacking

Hacking, often misunderstood, is a multifaceted world that has evolved over time. It began as a game, a puzzle to solve, much like the experiences of enthusiasts who explored the uncharted territories of cyberspace. Cultural touchstones like "Hackers" and "Mr. Robot" painted cyberspace as an exhilarating frontier, inspiring generations to pursue technology. Today, "ethical hacking stands as a pillar of modern cybersecurity, whereas its nefarious counterpart veers into the realm of digital malevolence," says Adriel Araujo, CEO, Hackmetrix. Moreover, it thrives in flourishing communities and elite competitions, evolving from a thrill to a serious vocation.

Photo by:   Image by Pete Linforth, Pixabay

You May Like

Most popular