SOAR Into More Integrated Cybersecurity

By Josh Magady, Section Manager, Senior Cybersecurity Consultant, and Practice Technical Lead, 1898 & Co. Why is being cybersecurity compliant not the same as preparedness for threats? Shouldn’t compliance mean full […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on SOAR Into More Integrated Cybersecurity

Uncovering hidden cybersecurity risks

By Adam Nichols, Principal of Software Security at GRIMM The technology we use and depend upon has critical vulnerabilities in their software and firmware, lurking just beneath the surface of […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Uncovering hidden cybersecurity risks

Why A ‘Layers And Lists’ Approach To Cybersecurity Is Doomed To Fail

By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a barrage of attacks on a single target and keep going until they find […]

Posted in Cyber Security News | Tagged , , , , , , , | Comments Off on Why A ‘Layers And Lists’ Approach To Cybersecurity Is Doomed To Fail

Malware Evasion Techniques

By Stas Gaivoronskii, Malware Analyst at ANY.RUN Cybercriminals create new ways to make malware invisible for detection. They hide malicious indicators and behavior during analysis. Researchers need to know about […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Malware Evasion Techniques

This man was planning to kill 70% of Internet in a bomb attack against AWS

The FBI arrested a man for allegedly planning a bomb attack against Amazon Web Services (AWS) to kill about 70% of the internet. The FBI arrested Seth Aaron Pendley (28), […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on This man was planning to kill 70% of Internet in a bomb attack against AWS

German Parliament Bundestag targeted again by Russia-linked hackers

Several members of the German Parliament (Bundestag) and other members of the state parliament were hit by a targeted attack allegedly launched by Russia-linked hackers. German newspaper Der Spiegel revealed […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on German Parliament Bundestag targeted again by Russia-linked hackers

Why Security Shouldn’t Only Fall on Employees

By Amit Bareket, Co-founder and CEO, Perimeter 81 As each day passes by, the news of a new data breach grabs the latest headlines. While there could be many reasons […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Why Security Shouldn’t Only Fall on Employees

REvil ransomware gang hacked Acer and is demanding a $50 million ransom

Taiwanese multinational hardware and electronics corporation Acer was victim of a REvil ransomware attack, the gang demanded a $50,000,000 ransom. Taiwanese computer giant Acer was victim of the REvil ransomware attack, the gang […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on REvil ransomware gang hacked Acer and is demanding a $50 million ransom

Moving to Active Defense: What It Means, How It Works and What You Can Do Now

By Ofer Israeli, CEO and founder, Illusive Networks Despite the myriad cybersecurity solutions out there, breaches, attacks and exploitations continue. The old approach isn’t working; cybersecurity teams need to move […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Moving to Active Defense: What It Means, How It Works and What You Can Do Now

Are Your Organization’s Critical Assets Five Steps or Fewer from A Cyber Attacker?

By Gus Evangelakos, Director Field Engineering, XM Cyber Cybersecurity is an asymmetric battle — and one in which attackers hold an unfair advantage. Adversaries maintain the initiative and can attack […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Are Your Organization’s Critical Assets Five Steps or Fewer from A Cyber Attacker?

Hackers stole data from Norway parliament exploiting Microsoft Exchange flaws

Norway parliament, the Storting, has suffered a new cyberattack, hackers stole data by exploiting recently disclosed Microsoft Exchange vulnerabilities. Norway ‘s parliament, the Storting, was hit by a new cyberattack, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Hackers stole data from Norway parliament exploiting Microsoft Exchange flaws

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 are now Open! Finalists Notified Before BlackHat USA 2024...

X