Why Now Is the Time to Prepare for The Quantum Threat
Quantum computers are set to bring about many changes to cybersecurity and beyond, but why should companies start preparations for the quantum threat today? By Ali El Kaafarani, CEO & […]
The Quantum Tipping Point
Fixing Cryptography Before It Is Broken By Carmen Kempka, Head of Corporate Technology, WIBU-SYSTEMS AG Ever since Peter Shor showed how a quantum computer could factorize large numbers with exponential […]
5 Ways Cybersecurity Will Change In 2022
By Jaime Coreano, Vice President of Sales – Flexxon The annual cost of cybercrime is set to hit $10.5 trillion by 2025. The losses caused by theft, fraud and embezzlement […]
5 Reasons Organizations Need Comprehensive AD Security Across Cloud and On-Prem
Why Organizations Need to Secure Directory Services in a Hybrid Deployment from Attack Paths By Justin Kohler, Director of BloodHound Enterprise at SpecterOps Microsoft Active Directory is one of […]
Top 10 Reasons Cyber Defense Firms Should Hire Veterans
Technology expert and former military intelligence officer shares insight on the valuable skills that veterans can bring to the cybersecurity industry By Bryon Kroger, Founder of Rise8 Following the […]
The Safest Ways for Bitcoin Trading
By Robert Wilson, Freelancer During the year 2021, we experienced history in the cryptocurrency niche with the 3rd Bitcoin halving event unfolding. There has been unprecedented hype after this news […]
Understanding Identity Detection and Response
Identity Detection and Response (IDR) is a new enterprise cybersecurity method that relies on the use of identity-related information to identify that a malicious attack campaign such as ransomware might […]
Detect Ransomware Data Exfiltration Immediately
By Randy Reiter CEO of Don’t Be Breached Ransomeware Attacks Have Increased During the COVID-19 Pandemic An off-site workforce has resulted in new security concerns since hackers now have many […]
Web Application Penetration Testing Checklist with OWASP Top 10
We’ve gone ahead and compiled this article to shed some light on the top ten web application security risks according to OWASP and how you can use this as a […]
Decision Trees in Case of a Ransomware Attack
Does Your Organization Have a Procedure to Handle a Ransomware? Is It Worth Paying the Attackers? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. The number of ransomware attacks […]
How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks
By P. William Zivanchev, Executive Director, Institute of Consumer Financial Education Introduction At first glance, readers may wonder why an article on identity theft appears in Cyber Defense Magazine, and […]
Cybersecurity Experts Share Their Predictions for 2022
By Danny Lopez, CEO of Glasswall The year 2021 raised many major cybersecurity concerns including the rise in ransomware attacks, phishing scams, and data breaches. Many organizations have embraced a […]
What Are DeFi Flash Loans & How to Prevent Flash Loan Attacks?
Decentralized Finance is changing the way we borrow and invest. Flash loans, a type of uncollateralized lending, have gained in popularity, as well as bad press. Flash loan attacks are […]
OT/IT Security – Two Sides of the Same Coin
By Sachin Shah, CTO of OT, Armis The distinction between information technology (IT) and operational technology (OT) is rapidly converging as the Industrial Internet of Things (iIoT) – with cross-boundary […]
Russian government claims to have dismantled REvil ransomware gang
Russia’s FSB announced to have dismantled the REvil ransomware gang, the infamous group behind Kaseya and JBS USA. The Russian Federal Security Service (FSB) announced to have shut down the […]
Why Americans Joined Europe in Not Paying Security Ransoms
By Lee Pitman, Global Head of Response Services, BreachQuest As we close out 2021, the biggest trend in the security and insurance space has to be the heightened regulatory scrutiny […]
USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence
US Cyber Command (USCYBERCOM) has officially linked the Iran-linked MuddyWater APT group to Iran’s Ministry of Intelligence and Security (MOIS). USCYBERCOM has officially linked the Iran-linked MuddyWater APT group (aka SeedWorm and TEMP.Zagros) […]
Phishing: How To Improve Cybersecurity Awareness
By Jason Stirland, CTO at DeltaNet International According to research by Proofpoint, 75% of organizations around the world experienced a phishing attack in 2020, and 74% of attacks targeting US businesses were […]
FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine
While investigating a data breach suffered by a healthcare organization, FBI accidentally revealed that it believes that the HelloKitty ransomware gang operates out of Ukraine. The investigation conducted by FBI […]
December 2021: Cyber Deception Month Continues…Today’s Cyber Deception Tools Are Straight Out of Science Fiction
Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks When it comes to predicting the future, the science fiction genre has taken some big swings over the years. Unfortunately, it’s […]
Cuba ransomware gang hacked 49 US critical infrastructure organizations
The FBI has revealed that the Cuba ransomware gang breached the networks of at least 49 US critical infrastructure organizations. A flash alert published by the FBI has reported that […]
The rise of millionaire zero-day exploit markets
Researchers detailed the multi-millionaire market of zero-day exploits, a parallel economy that is fueling the threat landscape. Zero-day exploits are essential weapons in the arsenal of nation-state actors and cybercrime […]
Multicloud Rolls In: Federal IT Professionals Share Insights and Challenges
By Rick Rosenburg, Vice President and General Manager, Rackspace Government Solutions, Rackspace Technology Federal agencies kicked into IT modernization overdrive during the pandemic and, as 2022 approaches, agencies are looking […]
The 5 Most Common Cyber-Attacks on Mobile Devices In 2021
By Nicole Allen, Marketing Executive, Salt Communications. Many companies are prioritising mobile efforts these days with research suggesting that increased mobility helps businesses enhance their operations and efficiency. Verizon’s 2021 […]
Five Cloud Telephony Security Vulnerabilities That Can Threaten Your Business
The Flip Side of Using Cloud Telephony Services By Sujan Thapaliya, CEO and Co-Founder, KrispCall It is evident that VoIP will be the future of business communications. Historically, it has […]
What To Know to Fight Against Cyber Attacks
By Gergo Varga, Senior Content Manager / Evangelist at SEON Cyber attacks have become a part of our reality, not only that we are all constantly getting phishing emails, but […]
Hundreds of thousands of fake warnings of cyberattacks sent from a hacked FBI email server
Threat actors hacked email servers of the FBI to distribute spam email impersonating FBI warnings of fake cyberattacks. The email servers of the FBI were hacked to distribute spam email […]
Why The Integration of Netops And Secops Is Here To Stay
By Eileen Haggerty, Sr. Director, Enterprise Business Operations, NETSCOUT The pandemic accelerated digital transformation and increased organizations’ reliance on cloud services, VPNs, and other solutions designed to support remote work. […]
New Magecart group uses an e-Skimmer that avoids VMs and sandboxes
A new Magecart group leverages a browser script to evade virtualized environments and sandboxes used by researchers. Malwarebytes researchers have spotted a new Magecart group that uses a browser script […]
Pink Botnet infected over 1.6 Million Devices, it is one of the largest botnet ever seen
Cybersecurity researchers uncovered a huge botnet, tracked as Pink, that already infected over 1.6 million devices most of them located in China. Qihoo 360’s Netlab Cybersecurity researchers discovered a huge […]