Fighting The International Cyber War with Ai
As Ukraine fights to maintain a stronghold on its besieged capital, cyberattacks are escalating. Governments on both sides of the Atlantic are concerned about a potential full-on cyberwar. By Jarred […]
4 Ways to Improve Azure Active Directory Security
Why identity has emerged as the security perimeter in hybrid deployments By Guido Grillenmeier, Chief Technologist at Semperis Cloud-led innovation has accelerated the digital transformation of many organizations that have […]
Redefining Resilience in The New World of Work
By Andrew Lawton, CEO of Reskube Ltd We are entering a new world of work. The Covid-19 pandemic has accelerated the move towards hybrid and remote working which was already […]
5 Ways Cybersecurity Will Change In 2022
By Jaime Coreano, Vice President of Sales – Flexxon The annual cost of cybercrime is set to hit $10.5 trillion by 2025. The losses caused by theft, fraud and embezzlement […]
Looking Ahead: Five Security Trends For 2022
A look at some of the key security trends for next year By Mark Guntrip, Strategy Leader at Menlo Security. Ransomware and the fight back Ransomware has dominated the […]
USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence
US Cyber Command (USCYBERCOM) has officially linked the Iran-linked MuddyWater APT group to Iran’s Ministry of Intelligence and Security (MOIS). USCYBERCOM has officially linked the Iran-linked MuddyWater APT group (aka SeedWorm and TEMP.Zagros) […]
AbstractEmu, a new Android malware with rooting capabilities
AbstractEmu is a new Android malware that can root infected devices to take complete control and evade detection with different tricks. Security researchers at the Lookout Threat Labs have discovered a new Android malware, […]
New CIOs: 5 Key Steps in Your First 100 Days
Getting the first 100 days right is critical to achieving momentum, credibility, and long-term success. By Etay Maor, Senior Director, Security Strategy, Cato Networks Starting off as a new CIO […]
Why A ‘Layers and Lists’ Approach to Cybersecurity Is Doomed to Fail
By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a barrage of attacks on a single target and keep going until they find […]
Naikon APT group uses new Nebulae backdoor in attacks aimed at military orgs
China-linked APT Naikon employed a new backdoor in multiple cyber-espionage operations targeting military organizations from Southeast Asia in the last 2 years. The Naikon APT group is a China-linked cyber espionage group that has […]
XCSSET malware now targets macOS 11 and M1-based Macs
XCSSET, a Mac malware targeting Xcode developers, was now re-engineered and employed in a campaign aimed at Apple’s new M1 chips. Experts from Trend Micro have uncovered a Mac malware […]
New Cring ransomware deployed targeting unpatched Fortinet VPN devices
Attackers are actively exploiting the CVE-2018-13379 flaw in Fortinet VPN to deploy the Cring ransomware to organizations in the industrial sector. Threat actors are actively exploiting the CVE-2018-13379 vulnerability in Fortinet […]
Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce
By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it […]
Election Integrity Is A Moving Target, But It’s Essential to Pursue
Measures to improve voting security need to start long before election day itself By Craig Hinkley, Chief Executive Officer, WhiteHat Security, a wholly-owned, independent subsidiary of NTT Ltd. U.S. […]
Mapping Automation to the MITRE ATT&CK Framework
By Chris Calvert, vice president, product strategy, and co-founder Respond Software As major enterprises race to digitize their IT and line of business infrastructures, cybersecurity has become an imperative, both […]
Are the Worst Cryptocurrency Security Breaches Behind Us?
By Tim Fries, Co-Founder, The Tokenist You would be right in assuming that blockchain itself was never hacked, but that doesn’t mean people don’t like to give up security features […]
Ransomware, Risk, And Recovery
Why You Need to Take A Hard Look At Your Corporate Recovery Plan By Mickey Bresman, CEO, Semperis What we as IT and security professionals worry about when planning […]
Everything You Want to Know About Single Sign-On
By Ayman Totounji, Founder , Cynexlink Wikipedia defines Single sign-on or SSO as “an authentication scheme that allows a user to log in with a single ID and password to any of […]
Why Finance Should Bank on Automating Security
By Faiz Shuja, co-founder & CEO at SIRP Challenger banks such as Monzo and Starling are shaking up the finance sector. Traditional bricks and mortar institutions are eyeing their success […]
The Journey to Universal Privilege Management
By Karl Lankford, Director – Solutions Engineering, BeyondTrust Almost without exception, today’s threat actors leverage readily available automated tools — automation increases the speed and probability that the attacker can […]
How to Avoid Being Breached In 2020
By Randy Reiter CEO of Don’t Be Breached Recent Data Breaches Disclosed in 2020 In February 2020 the United States Department of Defense (DOD) disclosed a data breach that occurred […]
Cybercriminals Exploit Coronavirus with Wave of New Scams
By David Ruiz, Malwarebytes Labs With no vaccine yet developed, and with much of the world undergoing intense social distancing measures and near-total lockdown procedures, threat actors are […]
Time Is of The Essence
Combating False Alarms and Delayed Detection Is Key to Defeating Advanced Cyber Threats By Filip Truta, Information Security Analyst, Bitdefender Keeping your organization safe from cyber threats drains considerable resources […]
The Secret to Winning IT Security Roulette
By Thomas Hatch Cybersecurity can oftentimes feel like you’re playing roulette. It can also feel like a long night in the casino where the longer you stay, the more likely […]
Protect Yourself from Threats and Fraud With XTN
By Guido Ronchetti, CTO of XTN Cognitive Security XTN develops Behavioral-based Fraud and Threat Protection solutions designed to defend digital businesses. Our security solutions are Cognitive, using proprietary AI algorithms. We also […]
TEHTRIS XDR Platform, A Holistic Cybersecurity Solution
By Laurent Oudot, Founder, CEO at TEHTRIS TEHTRIS is the European cybersecurity company that has designed and deployed the smart and holistic TEHTRIS XDR Platform in more than 50 countries […]
GDPR stand aside — meet CCPA!
The interactions between CCPA compliance and Security solutions. By Oren T. Dvoskin, Global Marketing Director, Sasa Software Introduction The California Consumer Privacy Act, AB 375 (”CCPA”) was enacted in June […]
World’s Largest Cybersecurity Unicorn Lives in China
By Edward Tsai – Director of Investment, Qi An Xin Who would think that the world’s largest Cybersecurity unicorn lives in China? In China, everything is on a larger scale. […]
Understanding the True Value of Digital Health Data
By Anne Genge, CEO, and co-founder of Alexio Corporation The story of Bob ‘What do I care if someone reads my dental chart?” This is what Bob said before I […]
Industrial Control System Vulnerabilities: A Prime Target of Our Critical Infrastructure by Adversaries
By Dr. Daniel Osafo Harrison, DCS, C|CISO, CISM, CISA, CRISC, Security+ Industrial control system (ICS) is a dynamic technological system with subsystems such as programmable logic controllers (PLCs), Remote Terminal […]