Combining True MDR & SOC for Robust Cybersecurity
By Jon Murchison, Founder, and CEO, Blackpoint Cyber Assessing the Current Threat Landscape The only constant in the cyberthreat landscape is that it is ever evolving. Amid a global pandemic, […]
Killware is the Next Big Cybersecurity Threat
By Brian Erickson, Vice President or Strategy and Solutions and retired U.S. Navy Captain, Vidoori Today’s battlefield has expanded to a digital landscape, and the impact affects the general population […]
Responding To the Ransomware Pandemic
By Tom McVey, Solution Architect, Menlo Security Last year, Kaseya became the victim of the largest ransomware attack in history when Russian-linked hacker group REvil breached the US software company’s […]
Why Ransomware is Only a Symptom of a Larger Problem
While ransomware is arguably the greatest current security threat to organizations, its rise has distracted us from the true issue at hand: extortion-based crimes. By Jeff Palatt, Vice President, Technical […]
5 Ways to Protect Your Workplace from Cybersecurity Threats
The cybersecurity environment is rapidly evolving. Meanwhile, technological advancements are steadily improving the ability for cyber criminals and hackers to exploit data security flaws. By Nicole Allen, Marketing Executive, Salt […]
Mitigating Risk from Insider Threats in 2022
By Isaac Kohen, Teramind Back in August 2020, a story of an insider threat caught headlines when the employee turned down a $1M bribe to put ransomware on Tesla’s servers […]
Decision Trees in Case of a Ransomware Attack
Does Your Organization Have a Procedure to Handle a Ransomware? Is It Worth Paying the Attackers? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. The number of ransomware attacks […]
How Do I Reliably Identify You If I Cannot See You?
eKnow Your Customer Requirements Driving Change By John Callahan, CTO, VeridiumID KYC – Know Your Customer is a process used around the globe for many years to validate the identity […]
Cybercriminals Hunt For Medical Data. Zero Trust As The Only Good Option To Keep The Healthcare System Secure
By Tomasz Kowalski, CEO, Secfense According to a Trustwave report, medical data may cost up to $250 per record on the black market, while stolen payment card data is sold […]
The Top 5 Cloud Security Predictions for 2022
New threats, new apps, new players – but data plays the biggest role in shaping the future. By Amit Shaked, CEO, Laminar 2021 Attacks Set New Records Looking back, 2021 […]
Our Cyber Defenses Need to Be Battle-Tested to Withstand Future Threats
By Hugo Sanchez, Founder and CEO of rThreat Just a few weeks ago, the FBI released a statement confirming that their server was hacked over the weekend, resulting in thousands […]
Cybersecurity Experts Share Their Predictions for 2022
By Danny Lopez, CEO of Glasswall The year 2021 raised many major cybersecurity concerns including the rise in ransomware attacks, phishing scams, and data breaches. Many organizations have embraced a […]
Prominent Carding Marketplace UniCC announced it’s shutting down
One of the biggest underground carding marketplaces, UniCC, announced it’s shutting down its operations. UniCC, one of the biggest underground carding marketplaces announced it is shutting down. The site was […]
Russian government claims to have dismantled REvil ransomware gang
Russia’s FSB announced to have dismantled the REvil ransomware gang, the infamous group behind Kaseya and JBS USA. The Russian Federal Security Service (FSB) announced to have shut down the […]
USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence
US Cyber Command (USCYBERCOM) has officially linked the Iran-linked MuddyWater APT group to Iran’s Ministry of Intelligence and Security (MOIS). USCYBERCOM has officially linked the Iran-linked MuddyWater APT group (aka SeedWorm and TEMP.Zagros) […]
How to Avoid Spam Texts and Protect Personal Information in the Digital Age
With Spam Texts on the Rise Consumers Must do their Due Diligence By Reinhard Seidel, Director Products at Clickatell How to Avoid Spam Texts and Protect Personal Information in the […]
Why Hackers Attack Mobile Devices and How to Prevent It
By Nicole Allen, Marketing Executive at Salt Communications According to a Gallup poll, the frequency of remote work cyber-attacks has nearly doubled since the beginning of the pandemic. Employees were […]
FIN7 group continues to target US companies with BadUSB devices
The Federal Bureau of Investigation (FBI) warns US companies that the FIN7 cybercriminals group is targeting the US defense industry with BadUSB devices. The US Federal Bureau of Investigation issued […]
It’s 2022 And Cyber Deception Has Arrived – Defeat Tomorrow’s Threat Today
Lessons from The Cheshire Cat in Concealment & Misdirection Cyber deception has come a long way from deploying honeypots on the external interface to research attack activity. Nowadays, deception technology […]
How To Thwart Fraud with Phone Numbers
By Guillaume Bourcy, Vice President, Data & Identity Solutions, TeleSign During the peak of the global pandemic, online shopping and cybercriminal activity hit unprecedented figures, hitting merchants’ bottom lines hard. […]
12 Tips for Improving Access Control in Your Organization
By Bryon Miller ASCENT In today’s world, we have more access to essentially all that’s available in our lives. More access to people and places. More access to information and […]
‘Spider-Man: No Way Home’ used to spread a cryptominer
Threat actors attempted to take advantage of the interest in the new ‘ Spider-Man: No Way Home’ movie to spread a Monero Cryptominer. Threat actors are attempting to capitalize the […]
Enterprises Cannot Achieve Zero Trust Security Without Machine Identity Management
Thanks to the rise of machines and shift towards zero-trust security, organizations’ security will require a new type of identity management By Murali Palanisamy, chief solutions officer, AppViewX The […]
PYSA ransomware gang is the most active group in November
PYSA and Lockbit were the most active ransomware gangs in the threat landscape in November 2021, researchers from NCC Group report. Security researchers from NCC Group reported an increase in […]
Conti ransomware gang exploits Log4Shell bug in its operations
The Conti ransomware gang is the first ransomware operation exploiting the Log4Shell vulnerability to target VMware vCenter Servers. Conti ransomware gang is the first professional race that leverages Log4Shell exploit to compromise […]
It’s About Time: The Unappreciated Fundamental Metric for Security
By Winn Schwartau During the Cold War, the US defended us poor, soon-to-be-nuked citizenry, with time. If the Soviets got it into their heads to send over a six-pack of […]
Crooks injects e-skimmers in random WordPress plugins of e-stores
Threat actors are injecting credit card swipers into random plugins of e-commerce WordPress sites, Sucuri researchers warn. Sucuri researchers are warning of threat actors injecting credit card swipers into random […]
CISA adds Log4Shell Log4j flaw to the Known Exploited Vulnerabilities Catalog
The U.S. CISA added 13 new vulnerabilities to the Known Exploited Vulnerabilities Catalog, including Apache Log4Shell Log4j and Fortinet FortiOS issues. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 13 […]
Cuba ransomware gang hacked 49 US critical infrastructure organizations
The FBI has revealed that the Cuba ransomware gang breached the networks of at least 49 US critical infrastructure organizations. A flash alert published by the FBI has reported that […]
Nobelium APT targets French orgs, French ANSSI agency warns
The French cyber-security agency ANSSI said that the Russia-linked Nobelium APT group has been targeting French organizations since February 2021. The French national cybersecurity agency ANSSI (Agence Nationale de la […]