Three Key Facts About AI-Driven Network Detection and Response
By Eyal Elyashiv, CEO, Cynamics Most network detection and response solutions and network performance monitoring and diagnostic tools are using the same paradigm that was invented three decades ago. However, networks themselves […]
What Are DeFi Flash Loans & How to Prevent Flash Loan Attacks?
Decentralized Finance is changing the way we borrow and invest. Flash loans, a type of uncollateralized lending, have gained in popularity, as well as bad press. Flash loan attacks are […]
WatchGuard Technologies’ 2022 Predictions: State-Sponsored Mobile Threats, Space-Related Hacks and More
A look at the future of cybersecurity in 2022 and beyond By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies 2021 was another wild year in cybersecurity with the industry facing […]
Looking Ahead: Five Security Trends For 2022
A look at some of the key security trends for next year By Mark Guntrip, Strategy Leader at Menlo Security. Ransomware and the fight back Ransomware has dominated the […]
First Steps to Alleviate Long-Term Consequences from A Cyberattack
Brief Guide By Sergey Ozhegov, CEO, SearchInform When a cyberattack occurs it is easy to panic and forget all the steps you have been told to make before. What is […]
How to Avoid Spam Texts and Protect Personal Information in the Digital Age
With Spam Texts on the Rise Consumers Must do their Due Diligence By Reinhard Seidel, Director Products at Clickatell How to Avoid Spam Texts and Protect Personal Information in the […]
Why Hackers Attack Mobile Devices and How to Prevent It
By Nicole Allen, Marketing Executive at Salt Communications According to a Gallup poll, the frequency of remote work cyber-attacks has nearly doubled since the beginning of the pandemic. Employees were […]
FIN7 group continues to target US companies with BadUSB devices
The Federal Bureau of Investigation (FBI) warns US companies that the FIN7 cybercriminals group is targeting the US defense industry with BadUSB devices. The US Federal Bureau of Investigation issued […]
Getting Started with Active Directory Security
Evaluating, Benchmarking and Creating a Strategy By Justin Kohler, Director of BloodHound Enterprise, SpecterOps Over 90% of the Fortune 1000 use Microsoft Active Directory (AD) for identity and access management. […]
Surviving The New Era of Terabit-Class DDoS Attacks
By Richard Hummel, Threat Intelligence Lead, NETSCOUTy In March 2018, a massive Distributed Denial of Service (DDoS) disrupted service for the developer platform GitHub. The attack, which lasted for approximately […]
“Owning Your Identity” Through Biometric and Passwordless Innovations
By Bob Eckel, CEO, Aware Consumers around the world have become increasingly comfortable engaging with businesses digitally. Between 2020 and 2021, driven in part by the pandemic, the proportion of […]
North Korea-linked threat actors stole $1.7 billion from cryptocurrency exchanges
North Korea-linked threat actors are behind some of the largest cyberattacks against cryptocurrency exchanges. North Korea-linked APT groups are suspected to be behind some of the largest cyberattacks against cryptocurrency […]
Cyber (In)Secure: Business Sentiment on Cyber Security Challenges
By James Edgar, Senior Vice President and Chief Information Security Officer, FLEETCOR Undoubtedly the last two years have been incredibly challenging for businesses, as many companies grappled with the health […]
‘Spider-Man: No Way Home’ used to spread a cryptominer
Threat actors attempted to take advantage of the interest in the new ‘ Spider-Man: No Way Home’ movie to spread a Monero Cryptominer. Threat actors are attempting to capitalize the […]
New Rook Ransomware borrows code from Babuk
Recently launched ransomware operation, named Rook, made headlines for its announcement claiming a desperate need a lot of money. A new ransomware operation named Rook appeared in the threat landscape, […]
Enterprises Cannot Achieve Zero Trust Security Without Machine Identity Management
Thanks to the rise of machines and shift towards zero-trust security, organizations’ security will require a new type of identity management By Murali Palanisamy, chief solutions officer, AppViewX The […]
PYSA ransomware gang is the most active group in November
PYSA and Lockbit were the most active ransomware gangs in the threat landscape in November 2021, researchers from NCC Group report. Security researchers from NCC Group reported an increase in […]
Conti ransomware gang exploits Log4Shell bug in its operations
The Conti ransomware gang is the first ransomware operation exploiting the Log4Shell vulnerability to target VMware vCenter Servers. Conti ransomware gang is the first professional race that leverages Log4Shell exploit to compromise […]
It’s About Time: The Unappreciated Fundamental Metric for Security
By Winn Schwartau During the Cold War, the US defended us poor, soon-to-be-nuked citizenry, with time. If the Soviets got it into their heads to send over a six-pack of […]
StayHackFree – Don’t Be Barry
The Holiday call from a buddy you do not want to get – much less make. By James Gorman, CISO, Authx Friday the week before Thanksgiving, driving home for the […]
FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine
While investigating a data breach suffered by a healthcare organization, FBI accidentally revealed that it believes that the HelloKitty ransomware gang operates out of Ukraine. The investigation conducted by FBI […]
Nobelium APT targets French orgs, French ANSSI agency warns
The French cyber-security agency ANSSI said that the Russia-linked Nobelium APT group has been targeting French organizations since February 2021. The French national cybersecurity agency ANSSI (Agence Nationale de la […]
How To Effectively Secure Connected Devices
By Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr As connected devices, including Internet of Things (IoT), Internet of Medical Things (IoMT) and Operational Technology (OT) continue to explode in […]
Analyzing The Security Challenge of Hybrid and Remote Working Models
By Mike East, VP EMEA, Menlo Security The pandemic has shifted the balance in many arenas, not least in relation to cybersecurity. Where COVID-19 has continued to have a drastic […]
FBI training document shows lawful access to multiple encrypted messaging apps
Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them. The Record shared an FBI training document that reveals the surveillance […]
Experts warn of attacks exploiting CVE-2021-40438 flaw in Apache HTTP Server
Threat actors are exploiting the recently patched CVE-2021-40438 flaw in Apache HTTP servers, warns German Cybersecurity Agency and Cisco. Threat actors are exploiting a recently addressed server-side request forgery (SSRF) […]
Multicloud Rolls In: Federal IT Professionals Share Insights and Challenges
By Rick Rosenburg, Vice President and General Manager, Rackspace Government Solutions, Rackspace Technology Federal agencies kicked into IT modernization overdrive during the pandemic and, as 2022 approaches, agencies are looking […]
Overcoming the Limitations of VPN, NAC, and Firewalls with Zero Trust Access
During 2020 and 2021, we’ve seen ransomware-as-a-service wreak havoc in the IT supply chain and critical infrastructure. Below we explore how technologies and approaches to help protect organizations from these […]
Why Email Archiving Builds Cyber Resilience
Plus 3 Email Archiving Solutions By Adnan A. Olia, Chief Operating Officer, Intradyn As innovations in technology continue to create new uses across an array of industries, cyber safety has […]
The 5 Most Common Cyber-Attacks on Mobile Devices In 2021
By Nicole Allen, Marketing Executive, Salt Communications. Many companies are prioritising mobile efforts these days with research suggesting that increased mobility helps businesses enhance their operations and efficiency. Verizon’s 2021 […]