Maximizing the Impact of AI/ML Threat Detection Tools

By Cary Wright, VP Product Management, Endace Companies are increasingly looking to Artificial Intelligence (AI) and Machine Learning (ML) threat detection tools to improve the security posture of the enterprise. […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Maximizing the Impact of AI/ML Threat Detection Tools

ChaChi, a GoLang Trojan used in ransomware attacks on US schools

A new Trojan written in the Go programming language, tracked as ChaChi, was involved in ransomware attacks against government agencies and US schools. Researchers from BlackBerry Threat Research and Intelligence […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on ChaChi, a GoLang Trojan used in ransomware attacks on US schools

Why We Care About Cybersecurity Hygiene

By James Opiyo, Senior Consultant Security Strategy, Kinetic By Windstream Maintaining good cybersecurity hygiene habits is just as important as maintaining good personal hygiene habits. We must maintain high cybersecurity […]

Posted in Cyber Security News | Tagged , , , , , , , | Comments Off on Why We Care About Cybersecurity Hygiene

Belgium Interior Ministry said it was hit by a sophisticated cyber attack

The Belgian interior ministry was targeted by a “sophisticated” cyber attack, a spokesman told RTBF public television on Tuesday.  The Belgian interior ministry was hit by a “sophisticated” cyber-espionage attack, […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Belgium Interior Ministry said it was hit by a sophisticated cyber attack

Executive Protection Needs to Include Digital

By Dr. Chris Pierson, Founder & CEO, BlackCloak Major firms and corporations already know full well the risks and dangers inherent to their executives’ security. Executive Protection is an established […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Executive Protection Needs to Include Digital

How to Become Unattractive for Cybercriminals

Map, monitor, and manage your attack surface to stay a step ahead By Stijn Vande Casteele, Founder and CEO, Sweepatic All organizations rely heavily on web presence to display their […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on How to Become Unattractive for Cybercriminals

Boffins found a bug in Apple AirDrop that could leak users’ personal info

Experts found a bug in Apple’s wireless file-sharing protocol Apple AirDrop that could expose user’s contact information. Boffins from the Technical University of Darmstadt, Germany, have discovered a privacy issue […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Boffins found a bug in Apple AirDrop that could leak users’ personal info

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X