Source: www.techrepublic.com – Author: Karl Greenberg Adobe Stock by: Monticellllo During the Google I/O event last month, the global tech giant showed off new elements of...
Author:
Firm study predicts big spends on generative AI – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: Tierney/Adobe Stock Software-as-service spend management software firm G2 reported that products with artificial intelligence functionality — particularly large language...
Cisco LIVE 2023: AI and security platforms innovations take center stage – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: Cisco Organizations worldwide are dealing with short-staffed security operations, and a security parasol that stitches together numerous single-point solutions...
Verizon 2023 DBIR: DDoS attacks dominate and pretexting lead to BEC growth – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: Ar_TH /Adobe Stock Verizon’s just-released 2023 Data Breach Investigations Report shows the continued effectiveness of business email compromises. The...
Google launches passkeys for Workspace – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: faithie/Adobe Stock Google validated the virtues of passkey authentication technology on Monday with an open beta version of passkey...
WWDC 2023: Apple launches Vision Pro and raft of products powered by new chipsets – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Apple’s Vision Pro AR headset. Image: Apple Apple announced on Monday at WWDC 2023 its much anticipated Vision Pro augmented...
1Password enables passkeys — a new option from passwords – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Identity management company 1Password is spinning up a pair of new features that constitute a major shift away from passwords...
Most people are aware of their data trails, but few know how to deal with it: Okta study – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg A new study by Okta finds that a proliferation of active accounts and web identities is exacerbating security risks both...
Threatening botnets can be created with little code experience, Akamai finds – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Researchers at Akamai’s Security Intelligence unit find a botnet specimen that reveals how successful DDoS, spam and other cyberattacks can...
Experts laud GDPR at five year milestone – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg on May 25, 2023, 6:23 PM EDT Experts laud GDPR at five year milestone The GDPR, in effect for five...
Microsoft warns of Volt Typhoon, latest salvo in global cyberwar – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: pinkeyes/Adobe Stock Microsoft’s warning on Wednesday that the China-sponsored actor Volt Typhoon attacked U.S. infrastructure put a hard emphasis...
WithSecure launches ‘outcome-based’ security at Sphere23 conference – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg At its Sphere23 event in Finland, security company WithSecure unveiled offerings focused on collaboration, business goals and outcomes. Image: Getty...
Spearphishing report: 50% of companies were impacted in 2022 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: ronstik/Adobe Stock Spearphishing is a sliver of all email exploits, but the extent to which it succeeds is revealed...
How business email compromise attacks emulate legitimate web services to lure clicks – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg New BEC cyberattacks use phishing with a legitimate Dropbox link as a lure for malware and credentials theft. Image: Adobe...
Okta’s Security Center opens window to customer insights, including threats and friction – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: Timon/Adobe Stock Since acquiring the application team platform Auth0 in 2001, identity management company Okta has pursued a platform-neutral...
Israel-based threat actors show growing sophistication of email attacks – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Abnormal Security is tracking cybercriminals from an unusual location for business email compromises who are using sophisticated spoofing to spur...
Google offers certificate in cybersecurity, no dorm room required – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: Sundry Photography/Adobe Stock While cyberattacks increased last year, with the trend continuing into 2023, there are still far too...
White House addresses AI’s risks and rewards as security experts voice concerns about malicious use – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: Shuo/Adobe Stock The White House, last week, released a statement about the use of artificial intelligence, including large language...
RIP World Password Day – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: Adobe Stock/ArtemisDiana While May 4 was World Password Day, the day prior constituted an inflection point that may force...
InfoBlox discovers rare Decoy Dog C2 exploit – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Domain security firm InfoBlox discovered a command-and-control exploit that, while extremely rare and complex, could be a warning growl from...
Juggling critical infrastructure for data centers, hospitals and more, with an eye on resilience – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: Gorodenkoff/Adobe Stock Data is as viable as the physical systems supporting and powering the servers that store it. Threats...
IBM launches QRadar Security Suite for accelerated threat detection and response – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: JHVEPhoto/Adobe Stock At the RSA Conference, IBM launched a platform-centric expansion to its QRadar security product, designed as a...
RSA: Cisco launches XDR, with focus on platform-based cybersecurity – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg on April 25, 2023, 6:41 PM EDT RSA: Cisco launches XDR, with focus on platform-based cybersecurity Cisco took the stage...
Google moves to keep public sector cybersecurity vulnerabilities leashed
Image: Sundry Photography/Adobe Stock Google and The Center for Internet Security, Inc., launched the Google Cloud Alliance this week with the goal of advancing digital security...
Malware is proliferating, but defenses are stronger: Mandiant
Image: Askha/Adobe Stock Threat groups are on the rise, and Google Cloud’s cyberdefense unit Mandiant is tracking 3,500 of them, with 900 added last year, including...
Ransomware attacks increased 91% in March, as threat actors find new vulnerabilities
on April 19, 2023, 6:31 PM EDT Ransomware attacks increased 91% in March, as threat actors find new vulnerabilities Ransomware attacks skyrocketed last month according to...
New DDoS attacks on Israel’s enterprises, infrastructure should be a wake-up call
Experts see the latest DDoS attacks against Israel as a case study in the effectiveness of simple, brute-force cybersecurity attacks, even against the most sophisticated targets....
Credential harvesting malware appears on deep web
Image: Adobe Stock/WunderBild Cloud-focused credential harvester and spam utilities, used to illicitly extract an organization’s database of usernames, passwords and emails, are on the rise. By...
For cybercriminal mischief, it’s dark web vs deep web
Image: oz/Adobe Stock Threat actors are consolidating their use of encrypted messaging platforms, initial access brokers and generative AI models, according to security firm Cybersixgill’s new...
Google Cloud offers Assured Open Source Software for free
Image: Google Open source software and software supply chain security risks continue to be a primary concern for developers and organizations. According to a 2022 study...