Three Key Facts About AI-Driven Network Detection and Response
By Eyal Elyashiv, CEO, Cynamics Most network detection and response solutions and network performance monitoring and diagnostic tools are using the same paradigm that was invented three decades ago. However, networks themselves […]
What Are DeFi Flash Loans & How to Prevent Flash Loan Attacks?
Decentralized Finance is changing the way we borrow and invest. Flash loans, a type of uncollateralized lending, have gained in popularity, as well as bad press. Flash loan attacks are […]
OT/IT Security – Two Sides of the Same Coin
By Sachin Shah, CTO of OT, Armis The distinction between information technology (IT) and operational technology (OT) is rapidly converging as the Industrial Internet of Things (iIoT) – with cross-boundary […]
USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence
US Cyber Command (USCYBERCOM) has officially linked the Iran-linked MuddyWater APT group to Iran’s Ministry of Intelligence and Security (MOIS). USCYBERCOM has officially linked the Iran-linked MuddyWater APT group (aka SeedWorm and TEMP.Zagros) […]
It’s 2022 And Cyber Deception Has Arrived – Defeat Tomorrow’s Threat Today
Lessons from The Cheshire Cat in Concealment & Misdirection Cyber deception has come a long way from deploying honeypots on the external interface to research attack activity. Nowadays, deception technology […]
Getting Started with Active Directory Security
Evaluating, Benchmarking and Creating a Strategy By Justin Kohler, Director of BloodHound Enterprise, SpecterOps Over 90% of the Fortune 1000 use Microsoft Active Directory (AD) for identity and access management. […]
How To Thwart Fraud with Phone Numbers
By Guillaume Bourcy, Vice President, Data & Identity Solutions, TeleSign During the peak of the global pandemic, online shopping and cybercriminal activity hit unprecedented figures, hitting merchants’ bottom lines hard. […]
Surviving The New Era of Terabit-Class DDoS Attacks
By Richard Hummel, Threat Intelligence Lead, NETSCOUTy In March 2018, a massive Distributed Denial of Service (DDoS) disrupted service for the developer platform GitHub. The attack, which lasted for approximately […]
“Owning Your Identity” Through Biometric and Passwordless Innovations
By Bob Eckel, CEO, Aware Consumers around the world have become increasingly comfortable engaging with businesses digitally. Between 2020 and 2021, driven in part by the pandemic, the proportion of […]
12 Tips for Improving Access Control in Your Organization
By Bryon Miller ASCENT In today’s world, we have more access to essentially all that’s available in our lives. More access to people and places. More access to information and […]
North Korea-linked threat actors stole $1.7 billion from cryptocurrency exchanges
North Korea-linked threat actors are behind some of the largest cyberattacks against cryptocurrency exchanges. North Korea-linked APT groups are suspected to be behind some of the largest cyberattacks against cryptocurrency […]
Cyber (In)Secure: Business Sentiment on Cyber Security Challenges
By James Edgar, Senior Vice President and Chief Information Security Officer, FLEETCOR Undoubtedly the last two years have been incredibly challenging for businesses, as many companies grappled with the health […]
New Rook Ransomware borrows code from Babuk
Recently launched ransomware operation, named Rook, made headlines for its announcement claiming a desperate need a lot of money. A new ransomware operation named Rook appeared in the threat landscape, […]
Enterprises Cannot Achieve Zero Trust Security Without Machine Identity Management
Thanks to the rise of machines and shift towards zero-trust security, organizations’ security will require a new type of identity management By Murali Palanisamy, chief solutions officer, AppViewX The […]
Conti ransomware gang exploits Log4Shell bug in its operations
The Conti ransomware gang is the first ransomware operation exploiting the Log4Shell vulnerability to target VMware vCenter Servers. Conti ransomware gang is the first professional race that leverages Log4Shell exploit to compromise […]
It’s About Time: The Unappreciated Fundamental Metric for Security
By Winn Schwartau During the Cold War, the US defended us poor, soon-to-be-nuked citizenry, with time. If the Soviets got it into their heads to send over a six-pack of […]
FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine
While investigating a data breach suffered by a healthcare organization, FBI accidentally revealed that it believes that the HelloKitty ransomware gang operates out of Ukraine. The investigation conducted by FBI […]
Crooks injects e-skimmers in random WordPress plugins of e-stores
Threat actors are injecting credit card swipers into random plugins of e-commerce WordPress sites, Sucuri researchers warn. Sucuri researchers are warning of threat actors injecting credit card swipers into random […]
Cuba ransomware gang hacked 49 US critical infrastructure organizations
The FBI has revealed that the Cuba ransomware gang breached the networks of at least 49 US critical infrastructure organizations. A flash alert published by the FBI has reported that […]
How To Effectively Secure Connected Devices
By Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr As connected devices, including Internet of Things (IoT), Internet of Medical Things (IoMT) and Operational Technology (OT) continue to explode in […]
Analyzing The Security Challenge of Hybrid and Remote Working Models
By Mike East, VP EMEA, Menlo Security The pandemic has shifted the balance in many arenas, not least in relation to cybersecurity. Where COVID-19 has continued to have a drastic […]
FBI training document shows lawful access to multiple encrypted messaging apps
Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them. The Record shared an FBI training document that reveals the surveillance […]
The rise of millionaire zero-day exploit markets
Researchers detailed the multi-millionaire market of zero-day exploits, a parallel economy that is fueling the threat landscape. Zero-day exploits are essential weapons in the arsenal of nation-state actors and cybercrime […]
Why Email Archiving Builds Cyber Resilience
Plus 3 Email Archiving Solutions By Adnan A. Olia, Chief Operating Officer, Intradyn As innovations in technology continue to create new uses across an array of industries, cyber safety has […]
Five Cloud Telephony Security Vulnerabilities That Can Threaten Your Business
The Flip Side of Using Cloud Telephony Services By Sujan Thapaliya, CEO and Co-Founder, KrispCall It is evident that VoIP will be the future of business communications. Historically, it has […]
Securing Today’s Hybrid Remote Workforce
By CISO T.J. Minichillo Work may never be the same again as the world continues to grapple with the global pandemic — pivoting from office-based business environments to fully remote […]
New evolving Abcbot DDoS botnet targets Linux systems
Qihoo 360’s Netlab detailed a new evolving DDoS botnet called Abcbot with wormable capabilities that targets Linux systems. Researchers from Qihoo 360’s Netlab security team have spotted a new botnet, […]
Hundreds of thousands of fake warnings of cyberattacks sent from a hacked FBI email server
Threat actors hacked email servers of the FBI to distribute spam email impersonating FBI warnings of fake cyberattacks. The email servers of the FBI were hacked to distribute spam email […]
Digital Transformation Security: Guidelines for Success
By Yehudah Sunshine, Head of PR, odix With the workforce going remote and IP existing almost exclusively in the digital domain enterprises, local and federal agencies, and SMBs alike are […]
You’ve Been Attacked by Ransomware. How Will You Respond?
By Steve Schwartz, director of security, ECI Earlier this year, a ransomware attack on the Colonial Pipeline led to a shutdown of 45% of the East Coast’s fuel supply, 12,000 […]