Graylog Insights -- How 2021 Will Shape 2022

People may not reminisce over 2021, but as Winston Churchill once said, “Those that fail to learn from history are doomed to repeat it.” 2021 swooped in on the coattails of a major supply chain data breach, and a lot of the challenges we experienced during this past year seemed to follow suit. To celebrate the best and hopefully move away from the worst that 2021 had to offer, this look back at 2021 trends can inspire us all to learn, and most of all, show us how to move forward.

Diagnostic Artificial Intelligence Models Can Be Tricked By Cyberattacks

Researchers discovered that diagnostic artificial intelligence models used to detect cancer were fooled by cyberattacks that falsify medical images. Diagnostic artificial intelligence (AI) models hold promise in clinical research, but a new study conducted by University of Pittsburgh researchers and published in Nature Communications found that cyberattacks using falsified medical images could fool AI models.

How to Protect Against Ransomware Attacks

Business leaders today are being pushed toward the rapid adoption of technology, especially in the wake of the COVID-19 pandemic – so much so that the term ‘digital transformation’ became a major trend. While tech is vital to the success of forward-thinking companies, many investments made in the name of digital transformation are revealed to be purchases that were “technology for the sake of technology”.

Protecting Your VoIP Infrastructure From DDoS Attacks

Distributed denial of service (DDoS) attacks continue to be a major issue for communications service providers, putting critical systems at risk, undercutting service level agreements, and bringing unwanted headlines. The first half of 2021 alone saw 5.4 million of these attacks reported, an 11 % increase over 1H2020. Some common characteristics across these attacks included: These aggressive DDoS attacks against service providers are bringing unwanted news headlines such as.

3 Ways To Prevent Cyber Security Threats When Marketing Online

No matter what type of business you operate, cyberattacks can be destructive to your company. Even though you think your Information Technology (IT) team should be handling any cybersecurity issues, it doesn't have to always go that way. All the departments should take a proactive role in safeguarding the privacy of your business.

Ransomware Recovery: Langs Building Supplies "We've Been Hacked!"

It was 4:00 in the morning, May 20, 2021. Matthew Day, CIO of Langs Building Supplies (Langs) was excited for a long-anticipated holiday after 14 months of lockdown due to COVID-19. His wife was thrilled. His friends, ecstatic. But the day took an unexpected turn. Instead of waking up delighted to leave for his getaway, Day woke up to every CIO’s worst nightmare, the dreaded phone call: “We’ve been hacked.”

Update on the Nobelium APT Attack Group

If you’re like me, you started your week by reading the Microsoft blog about Nobelium, an advanced-persistent-threat (APT) group that was actively targeting cloud service providers (CSPs) and managed services provider (MSPs) in a recent wave of supply chain attacks. Personally, I wasn’t terribly surprised. We all know by now that MSPs have a bullseye on them for adversaries wishing to target the supply chain. What’s different about this attack is the motive.

Cyber Security Protocols Your Online Business Needs

According to a recent report by CNBC, only 14% of businesses have adequate safeguards against potential cyberattacks. The finding is alarming considering that businesses of all sizes lose close to $200,000 annually due to cyber-related attacks. Ensuring that you have in place water-tight cybersecurity protocols for your online business is a security measure you cannot overlook.

5 times domains have been hijacked

It’s a common belief that once we purchase a domain, it’ll be ours for as long as we like. Big mistake. Mainly because there are genuine threats to your domain online that mostly go unthought of. For example, hackers can gain access to your system and take your domain for ransom or cause malicious damage to you and your business. Surprised? Well, we have 5 examples of exactly when this has happened, and how hackers have managed to gain access to domains and cause mass disruption.

Cyber Attacks 'Be Cyber Smart and Avoid Collateral Damage'

Cybersecurity Awareness Month, now in its 18th year, is an opportunity to highlight the continually escalating conflict that is, for the most part, hidden from the public – unless it becomes media-worthy. Every day, those who are responsible for security (IT staff, threat and security analysts to CISOs) face new challenges. Digital transformation has accelerated at hyperspeed because organizations are focused on adjusting to COVID-19 disruptions.