Global Secure Solutions Ghana Limited launches managed cybersecurity services for SMEs

Work From Home Environments Create New Opportunities for Cybercriminals Accra, Labone: October 26, 2021 – Businesses entered 2020 with plans for continued growth and innovation, with a global market economy poised for growth. COVID-19 and the related economic downturn disrupted…

6 Common Phishing Attacks and How to Protect Against Them

By: David Bisson Source: Tripwire.com Phishing attacks continue to play a dominant role in the digital threat landscape. In its 2020 Data Breach Investigations Report (DBIR), for instance, Verizon Enterprise found that phishing was the second topmost threat action variety in security…

Detailed Threat Analysis of Shamoon 2.0 Malware

DevOps. Machine learning. Faster decision making. The biggest trends in IT are helping us speed release cycles, get more insights, and improve operations like never before. But as IT begins adopting and optimizing these new strategies in their organization, there’s…

How Simulation Training is becoming an Integral part of Cyber Preparedness. (Recorded Webinar)

https://player.vimeo.com/video/428224232 Defining and testing a cyber incident response plan is a highly effective way of reducing the impact and duration of a real cyber incident. Detect and respond to cyber incidents in line with your organisation's response plan, based on…

COVID-19 | The Cybersecurity Effect of the Pandemic

By: Edem Glymin, Lead security and risk consultant for Global Secure Solutions Ghana Limited. How did we get here? Suddenly the world as we knew it came to a grinding halt and tottered on the brink of despair. In a…

Hackers Are Selling a Critical Zoom Zero-Day Exploit for $500,000

By Lorenzo Franceschi-Bicchierai , Source: Motherboad, Tech by VICE Hackers are selling two critical vulnerabilities for the video conferencing software Zoom that would allow someone to hack users and spy on their calls, Motherboard has learned. The two flaws are…

Vietnam-linked hackers targeted Chinese government over coronavirus response: researchers

By: Jack Stubbs, Raphael Satter Additional reporting by Muyu Xu in Beijing and James Pearson in Hanoi; Editing by Richard Chang  Source: Reuters LONDON/WASHINGTON (Reuters) - Hackers working in support of the Vietnamese government have attempted to break into Chinese…

Understanding SIM Card Forensics

By: Rohit Shaw Source: eforensicsmag References http://www.forensicmag.com/articles/2011/04/sim-forensics-part-1 http://www.infosecinstitute.com/courses/mobile-computer-forensics.html https://www.visualanalysis.com/ProductsVA_SIMpull.aspx http://csrc.nist.gov/groups/SNS/mobile_security/documents/mobile_forensics/Reference%20Mat-final-a.pdf The SIM (subscriber identity module) is a fundamental component of cellular phones. It’s also known as an integrated circuit card (ICC), which is a microcontroller-based access module. It is a…