Dear Reader, 

February and March have been tumultuous in cybersecurity. From illegal wars fueling an increase in cybercrime to the need for workers in the new cyberwar engulfing the world. It hasn’t been fun, but we know we are providing a valuable service in our coverage. Here are some highlights and hints of what is to come.

Enjoy reading!

Best regards

Patrick Boch & Lou Covey
Editors
 

Crypto mining turns agressive

We’ve long known about “crypto jacking,“ the way crypto miners surreptitiously take over compute power of private devices, but they are getting more aggressive. Case in point, the ransomware attack on NVIDIA is not for money but to force the GPU provider to turn off protections against unauthorized mining.

We talked with Andrew Newman, CTO and founder of ReasonLabs about a new report on the growth of crypto jacking and what consumers can do about it.

 

Consumer Cybersecurity: Watch for Miners
Consumers are facing cybersecurity threats on virtually every possible endpoint. A new report details the top cybersecurity threats that consumers faced in 2021.
Read more...

Ukraine engulfs the cyber world

We have covered the Ukraine war as it relates to cyber security and were the first to describe the virtual civil war between hackers. Anonymous has taken a side against Russia and the Russian cybercrime gang Conti has split up over the controversy. If you missed it, catch up here.

Ukraine: Open Warfare in the Cyber World
Cyber warfare has been an open secret for many years, but the conflict in Ukraine has brought it out into the open. Listen to our Interview with Dr. Pano Yannakogeorgos…
Read more...
Cyber civil war erupts over Ukraine
In recent weeks leading up to and through the invasion of Ukraine, divisions have formed within the hacker community worldwide. So obvious, in fact, that we may be witnessing a…
Read more...

Women in Technology

International Women’s Day has passed but it should not be forgotten for another year. Revisit some of our coverage about “Breaking the Bias.”

 

Break The Bias: International Women's Day
It's International Women's Day! Cyber Protection Magazine spoke with executives from various companies to learn how women in cybersecurity can #BreakTheBias
Read more...
Women in Technology: Time to #Breakthebias
The second part of our article for today's international women's day - more quotes from the industry on #BreakThe Bias
Read more...

Texting as a Human Right

We covered the security problem of texting apps, especially for dissidents involved in the Ukrainian war. And as much as we wanted to avoid a clickbait list, messaging apps have become a linchpin in maintaining open communication so we decided to do a list of what we consider to be the best five messaging apps readily available worldwide. You may be surprised to find what is NOT on the list. 

Popular Apps Endanger Ukrainians.
Text messaging has been around almost as long as the internet and predates mobile phones altogether. It’s not only a great way to surveil unwitting people but a great avenue…
Read more...
CPM’s Top Five Secure Messaging Apps
There is no lack of lists for the “best” secure messaging apps but we’ve noticed a few things about them: Not all apps on the lists are inherently secure. Hence,…
Read more...

Join us for Cloud Expo Europe

Cloud Expo Europe Frankfurt is back on 11-12 May 2022 at Messe Frankfurt - and we will be there, too.

 

In fact, the first ever printed version of our special edition will make it's debut at Cloud Expo. And we're looking for content, so if you're interested, drop us a line and you might see your article in print in Frankfurt!

 

About the Event:

Join us and experience a two-day event around meeting exhibitors, networking with peers and getting the knowledge from the industry professionals! This year we will have a special Cyber Security Zone showcasing the world's leading cyber security vendors. With two theatres dedicated to Cyber Security content over the two days, the Cyber Security Zone will offer an unrivalled platform for business leaders and IT professionals to learn how to protect their digital infrastructure. 

 

Agenda: https://www.cloudexpoeurope.de/cyber-protection

Register for VIP-Access: https://www.cloudexpoeurope.de/cyber-protection-magazine

Coming up 

Pentesting: We still consider penetration testing to be step one in securing your data and were taking a look at the state of the practice in the coming weeks with video interviews and articles.

Ice phishing: Phishing attacks are still the most prevalent cybercrime in the world but the world of decentralized finance (DeFi) has created an entirely new form of the crime focused exclusively on non-custodial cryptocurrency wallets. We are talking about how it might not be illegal… yet.

Cyber insurance: We’ve already started covering cyber insurance, but there will be more.

Hiring practices: We have scheduled a series of articles and interviews on the change in hiring practices and the dearth of workers. We will be focusing on that in the near future.

Thanks for reading and if you liked our newsletter, please share it with friends and colleagues.

facebook  twitter  linkedin  youtube 
Cyber Protection Magazine
https://cyberprotection-magazine.com
Modify your subscription    |    View online