Source: www.infosecurity-magazine.com – Author: 1 Microsoft Threat Intelligence has shed light on a previously tracked threat actor (DEV-0586), now known as “Cadet Blizzard.” The tech giant...
Month: June 2023
Study Reveals Ransomware as Most Popular Cybercrime Service – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Ransomware has emerged as the most prevalent form of Malware-as-a-Service (MaaS) over the past seven years. The data comes from a...
#InfosecurityEurope: EMEA Retailers Experience Surge in Web Attacks, With Germany Heavily Targeted – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 EMEA was the most targeted region for web attacks on retailers in Q1 2023, surpassing North America, a new study by...
#InfosecurityEurope: New Study Takes a Deep Dive Into Lookalike Attacks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Cyber-attacks using malicious lookalike domains, email addresses and other types of registered identifiers are rising, domain name system (DNS) security provider...
#InfosecurityEurope: Cost-of-Living Crisis Drives Insider Threat Concerns – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Nearly half (47%) of UK business leaders believe their organization has been at a greater risk of attack since the start...
#InfosecurityEurope: Breaches Down as Security Culture Improves – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A survey of ClubCISO members has found that global organizations are becoming more resilient to cyber compromise, with over three-quarters (76%) of...
LockBit Makes $91m From US Victims in Two Years – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The infamous LockBit ransomware variant has made extortionists close to $100m from US victims alone since January 2020, allied security agencies...
The Week in Security: Ukraine APT attacks tied to Russia, critical eye placed on AI-generated software – Source: securityboulevard.com
Source: securityboulevard.com – Author: Carolynn van Arsdale Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the...
Mystic Stealer – Source: securityboulevard.com
Source: securityboulevard.com – Author: Brett Stone-Gross Key Points Mystic Stealer is a new information stealer that was first advertised in April 2023 Mystic steals credentials from...
Combating Generative AI Bots – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jenn Jeffers Chatbot Revolution: How Generative AI Bots Are Impacting Business When it comes to maintaining the integrity and security of their...
Emerging Trend: Malicious Use of New Google Domains .zip and .mov – Source: securityboulevard.com
Source: securityboulevard.com – Author: Team Nuspire Google recently introduced eight new top-level domains (TLDs) that can be purchased for hosting websites or email addresses. Popular TLDs...
SaaS go-to-market executive Chris Jones joins Sift as Chief Revenue Officer – Source: securityboulevard.com
Source: securityboulevard.com – Author: Chris Jones I love the challenge of working in a market where there are massive customer problems, such as online fraud, with...
Threat Spotlight: Incident Response & Cybercrime in 2023 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka Executive Summary As the threat environment rapidly changes (and threat actors’ tactics along with it), what should cyber practitioners be...
Verizon’s Data Breach Investigations Report: Enterprise Data is Under Attack from All Sides – Source: securityboulevard.com
Source: securityboulevard.com – Author: Mirza Salihagic IT and security leaders increasingly see data-driven decision making as the key to strategic success. But that puts an increasing...
ChatGPT Spreads Malicious Packages in AI Package Hallucination Attack – Source: securityboulevard.com
Source: securityboulevard.com – Author: Teri Robinson A newly discovered ChatGPT-based attack technique, dubbed AI package hallucination, lets attackers publish their own malicious packages in place of...
ETL vs. ELT: Selecting the Optimal Data Integration Method for Your Business – Source: securityboulevard.com
Source: securityboulevard.com – Author: Dariel Marlow In today’s data-driven world, businesses are faced with the challenge of efficiently integrating and transforming vast amounts of data. With...
Passkeys Can Make Passwords a Thing of the Past – Source: securityboulevard.com
Source: securityboulevard.com – Author: Phil Dunkleberger We all seem to have a love/hate relationship with passwords. Over time, we have learned to live with them–even when,...
Content Moderation Tech Startup Trust Lab Snags $15M Investment – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Trust Lab, a Silicon Valley startup founded by Google’s former head of Trust and Safety, has bagged $15 million in...
OT Security Firm Shift5 Adds $33 Million in Funding – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend Arlington, VA-based OT security firm Shift5 has raised an additional $33 million in its Series B financing. $50 million was...
XSS Vulnerabilities in Azure Led to Unauthorized Access to User Sessions – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Two cross-site scripting (XSS) vulnerabilities in Azure Bastion and Azure Container Registry (ACR) could have led to unauthorized access to...
Barracuda Zero-Day Attacks Attributed to Chinese Cyberespionage Group – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The recent attacks exploiting a zero-day vulnerability in a Barracuda Networks email security appliance have been attributed by Mandiant to...
SquareX Launches Bug Bounty Program for Browser Security Product – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Hot on the heels of a $6 million seed funding round, cybersecurity startup SquareX today announced a six-week bug bounty...
Fake Security Researcher Accounts Pushing Malware Disguised as Zero-Day Exploits – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Exploit and vulnerability intelligence provider VulnCheck has issued a warning over fake security researcher accounts distributing malware disguised as zero-day...
Four Things to Consider as You Mature Your Threat Intel Program – Source: www.securityweek.com
Source: www.securityweek.com – Author: Marc Solomon When ESG recently asked security professionals to identify the attributes of a mature threat intelligence program, the top response was...
US Organizations Paid $91 Million to LockBit Ransomware Gang – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The LockBit ransomware gang has launched roughly 1,700 attacks in the United States and received approximately $91 million in ransom...
How Europe is Leading the World in the Push to Regulate AI – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press Lawmakers in Europe signed off Wednesday on the world’s first set of comprehensive rules for artificial intelligence, clearing a key...
Microsoft Outs New Russian APT Linked to Wiper Attacks in Ukraine – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Security researchers at Microsoft are publicly outing a new APT group linked to Russia’s General Staff Main Intelligence Directorate (GRU),...
Android GravityRAT malware now steals your WhatsApp backups – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A new Android malware campaign spreading the latest version of GravityRAT has been underway since August 2022, infecting mobile devices...
Clop ransomware gang starts extorting MOVEit data-theft victims – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams The Clop ransomware gang has started extorting companies impacted by the MOVEit data theft attacks, first listing the company’s names on...
Traditional Pen Testing vs. PTaaS with Web Application Security – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Outpost24 While traditional penetration testing (pen testing) has long been the go-to method for identifying security gaps in a organization’s network...





























