Cyber EO and Meeting Cloud Modernization Effort
By Stephen Kovac, Vice President of Global Government and Head of Corporate Compliance, Zscaler In wake of recent high profile attacks and an evolving hybrid work environment, agencies are working […]
New SOVA Android Banking trojan is rapidly growing
SOVA is a new Android banking trojan that targets banking applications, cryptocurrency wallets, and shopping apps from the U.S. and Spain. Researchers from cybersecurity firm ThreatFabric have spotted in the […]
Offense Activities Sharing in Criminal Justice Case
By Milica D. Djekic The criminal justice case could include a broad spectrum of details getting the need to be deeply explored and investigated by the case management team and […]
FBI IC3 warns of a spike in sextortion attacks
The FBI Internet Crime Complaint Center (IC3) warns of a spike in sextortion attacks since the beginning of 2021 that caused $8M losses. The FBI Internet Crime Complaint Center (IC3) […]
Cyber Security Incident Response Plan: How to Proactively Prepare for a Breach
By Joseph Carson, Advisory CISO, ThycoticCentrify Many organizations are coming to the harsh realization that it’s only a matter of when, not if, they will fall victim to a cyberattack. […]
How Trustworthy is Your Cyber Defense?
Make your cybersecurity spending pay off with added defense tactics and provider accreditation By Tom Brennan, Chairman, CREST USA Cyber criminals are branching out from the big guys, the Facebook-type […]
The FBI issued a flash alert for Hive ransomware operations
The Federal Bureau of Investigation (FBI) published a flash alert related to the operations of the Hive ransomware gang. The Federal Bureau of Investigation (FBI) has released a flaw alert […]
FIN8 group used a previously undetected Sardonic backdoor in a recent attack
Financially motivated threat actor FIN8 employed a previously undocumented backdoor, tracked as ‘Sardonic,’ in recent attacks. The financially motivated threat actor FIN8 has been observed employing a previously undetected backdoor, […]
T-Mobile data breach could be worse than initially thought, 54 million customers impacted
T-Mobile data breach could be worse than initially thought, an update to the investigation reveals that over 54 million individuals were impacted. T-Mobile data breach could be worse than initially […]
Embed Security into Your Modernized Applications
By Gadi Naor, CTO and Co-Founder of Alcide Companies may be feeling pressure to modernize their legacy, monolithic applications for many reasons: some may wish to operate on a larger […]
Understanding The Importance of Designing for Security
By Camille Morhardt, Director of Security Initiatives and Communications at Intel, and Tom Garrison, VP and GM of Client Security Strategy and Initiatives at Intel Robust security is a necessary […]
UNC215, an alleged China-linked APT group targets Israel orgs
China-linked threat actors UNC215 targeted Israeli organizations in a long-running campaign and used false flags to trick victims into believing the attacks was from Iran. A China-linked cyber-espionage group has […]
Taking Back Control of Today’s Software Supply Chain
By Jasmine Noel, Senior Product Marketing Manager, ReversingLabs Supply chains are under attack. Malicious actors perpetrating these breaches will continue to succeed until security teams abandon common myths and misconceptions […]
The Silver Bullet for Ransomware’s Golden Goose
Ransomware is a hugely profitable business. The only way to end it is to stop criminals from making money off your data. By Elliot Lewis, Co-founder, and CEO of Keyavi Data Corp. […]
XCSSET MacOS malware targets Telegram, Google Chrome data and more
XCSSET macOS malware continues to evolve, now it is able to steal login information from multiple apps, including Telegram and Google Chrome. Security researchers from Trend Micro continues to monitor […]
Regula Delivers Remote Identity Verification for Everyone
A modern world requires modern solutions. Fraudsters constantly improve their skills; do not let your services lag behind! By Arif Mamedov, Ph.D., President of Regula Forensics, Inc. Previously an opportunity, […]
New enhanced Joker Malware samples appear in the threat landscape
The Joker mobile trojan is back, experts spotted multiple malicious apps on the official Google Play store that were able to evade scanners. Experts reported an uptick in malicious Android […]
BIOPASS malware abuses OBS Studio to spy on victims
Researchers spotted a new malware, dubbed BIOPASS, that sniffs victim’s screen by abusing the framework of Open Broadcaster Software (OBS) Studio. Researchers from Trend Micro spotted a new malware, dubbed BIOPASS, that […]
Understanding Why Multi-Signal MDR Matters
Cloud adoption, business applications and remote users continue to expand at exponential rates. Your cybersecurity team is fighting a losing battle to keep pace with your business requirements and growing […]
WildPressure APT expands operations targeting the macOS platform
Researchers from Kaspersky have spotted a new malware used by the WildPressure APT group to targets both Windows and macOS systems. The WildPressure was spotted for the first time in August 2019 […]
How Various Flavors of PKI Can Protect and Secure Financial Services Data
By Abul Salek, Director of Product Management, Sectigo How much time and budget does your company allocate to cybersecurity to protect you and your customers’ critical data and private information? […]
In the Midst of COVID-19, We’re Seeing a Pandemic of Cyber Attacks
By Babur Khan, Technical Marketing Engineer – Enterprise Security at A10 Networks In the first quarter of 2021, the COVID-19 pandemic is still wreaking havoc around the globe. The coronavirus […]
UNC2465 cybercrime group launched a supply chain attack on CCTV vendor
UNC2465 cybercrime group that is affiliated with the Darkside ransomware gang has infected with malware the website of a CCTV camera vendor. An affiliate of the Darkside ransomware gang, tracked as […]
Manage the Cloud Permissions Gap to Achieve Zero Trust
The Cloud Permissions Gap exposes organizations to highly exploitable risk combined with the inability to implement and manage Zero Trust policies. By Raj Mallempati, CloudKnox Security COO In 2020, when […]
REvil ransomware gang hit US nuclear weapons contractor Sol Oriens
The REvil ransomware gang made the headlines again, the group hit the US nuclear weapons contractor Sol Oriens and stole the victim’s data. US nuclear weapons contractor Sol Oriens was […]
The Solution to Overcoming Cyber Threats in A 5g World
Optical Wireless Communciations (Owc) Will Be Key For Maximizing Security By Michael Abad-Santos, Senior Vice President of Business Development and Strategy, BridgeComm Nearly 6 billion Internet of Things (IoT) devices […]
Key Business Lessons Learned from The SolarWinds Hack
By, George Waller, CEO of Strikeforce Technologies A full year of disruption by the global pandemic has forced businesses to adapt fast to the shifting remote work realities. This new […]
DoJ: Investigations into ransomware attacks must have similar priority as terrorism
The U.S. Department of Justice was to assign investigation on ransomware attacks the same priority as terrorism in the wake of the Colonial Pipeline hack. The U.S. Department of Justice […]
Addressing the Growing Cybersecurity Risks of Cyber-Physical Systems
By Michael Welch, Managing Director, MorganFranklin Cyber Cyberattacks against critical infrastructure and other cyber-physical systems have increased for years. These attacks are particularly concerning because they pose a real threat […]
New Epsilon Red Ransomware appears in the threat landscape
Researchers spotted a new piece of ransomware named Epsilon Red that was employed at least in an attack against a US company. Researchers from Sophos spotted a new piece of […]