Bangladesh Cyber Heist 2.0: Silence APT goes global Singapore, 03.07.2019 – Group-IB, an international company that specializes inpreventing cyber attacks, has established that Silence, a Russian-speakingcybercriminal group is likely to be behind the brazen attack on Dutch-BanglaBank’s ATMsresulting in the theft of $3 million, the amount reported by the localmedia. The actual amount of money … Read moreDUTCH-BANGLA BANK COMPROMISED BY THE NOTORIOUS SILENCE GANG
Yes, of course you need to back up your critical data files, and yes, the cloud has made that task easier. But the cloud and virtualization have also added a whole new aspect to backup and many people are forgetting about it. This may not be a valid assumption but, if you’re in business, then … Read moreBacking Up May Be Easier, But There’s More to It Than You Think
Change is a necessity. The way of living and working is constantly changing. The same thing applies on technology. According Moore’s law computing would dramatically increase in power, and decrease in relative cost, at an exponential pace. And that happened. No other technology has made progress at that rate, not even close. No other technology … Read moreCyber Security-A Never Ending Process
What is a DDoS Attack? A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited … Read moreDDoS Attack
Well, it is, in the worst-case scenario. When an organization falls victim to cybercrime, solace can be sought in the best of the worst if it is a hack rather than a breach. A breach means the organizations cybersecurity sucks. There is a big difference between a cyber hack and a cyber breach. A hack … Read moreBetter to be hacked than breached!
It takes courage and boldness to commit a crime in the real world. Physicalinvolvement. On the other hand, criminals in the virtual world are nerdshiding behind a web of algorithms. They act remotely and do not requirephysical interaction to commit a crime. A cybercriminal will in all probabilitieslack the guts to rob a bank, but … Read moreThe Tangible and Non-Tangible Crime Factor
If they have not been keen yet, they will find it alluring now. News circulating on the recent bank breach incidences will be drawing a lot of attention in the cyber underworld. The international tech news channels are churning as the recent local news has been picked up in discussion. I recently came across an … Read moreInternational Notorious Cybercriminal Groups Getting Allured To Target Banks in Bangladesh?
Do you find that a valid question? I do. And that’s what I perceive interacting around. And in many cases with tech people also. People in general get to know about cybercrime incidences from the news circuit or social media. And these incidences are presented as stories. In various flavours. A 14-year-old boy is a hacker … Read moreAre people more nervous with cybersecurity than cybercrime?
With turmoil around US and European markets on and off (which seems to be happening now and then and becoming hard to follow on the news also) vendors, particularly software ones from the European part widely covered, are eyeing or even let’s say focusing on the Asia Pacific region. Their activities are increasing around here, … Read moreThe South Asia Market Dilemma
Statistically 28 to 29% of the cyber breaches are orchestrated by insiders while 70% of the cyber breaches happen due to human factors – intentional or unintentional. Sounds confusing. But two different aspects. Insider threats are a cybercrime. Intentional. Cyber breaches from human factors on the other hand are vehicles to a cybercrime. Intentional cyber … Read moreInsider Threats: Cyber vulnerability comes from inside too