Security researchers are sounding the alarm on what may well be another major SolarWinds or Kaseya-like supply chain attack, this time involving Windows and Mac versions...
BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist
Some cybercriminals are flipping their playbook on business email compromise (BEC) scams and, rather than posing as vendors seeking payment, are now posing as buyers, taking...
How to Solve IoT’s Identity Problem
Network security and asset management products have to be able to identify what operating systems are currently running in the organization. With this information, IT and...
Microsoft Patches ‘Dangerous’ RCE Flaw in Azure Cloud Service
Microsoft has patched what researchers called a “dangerous” flaw in its Azure Service Fabric component of the company’s cloud-hosting infrastructure. If exploited, it would have allowed an...
Organizations Consider Self-Insurance to Manage Risk
As the market for cybersecurity insurance evolves and matures, insurance giant Lloyd’s of London is preparing to exclude most nation-state attacks from its coverage policies. In...
DataDome Closes $42M in Series C Funding to Advance the Fight Against Bot-Driven Cyberattacks and Fraud
NEW YORK, March 30, 2023 /PRNewswire/ — DataDome, a leading provider of AI-powered online fraud and bot management, today announced its Series C funding round of $42 million. This round...
Socura Launches Managed SASE (MSASE) Service
LONDON, March 30, 2023/PRNewswire/ — Socura, a UK-based cyber security managed services specialist, today announced the launch of its Managed SASE (Secure Access Service Edge) service...
Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework
By Kaustubh Medhe, Head of Research and Intelligence A recent market survey report (Source: Fortune Business Insights, March 2023) pegged the current market size of the...
Some use the hoax known as ‘swatting’ to spread misinformation on social media
STEVE INSKEEP, HOST: We have a story that begins with a man named Travis Rothweiler. TRAVIS ROTHWEILER: I can remember being in a meeting. And in...
Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability
Mar 31, 2023Ravie LakshmananCyber Espionage / APT The advanced persistent threat (APT) actor known as Winter Vivern is now targeting officials in Europe and the U.S....
Zimbra Flaw Exploited by Russia Against NATO Countries Added to CISA ‘Must Patch’ List
The US Cybersecurity and Infrastructure Security Agency (CISA) has added to its ‘Must Patch’ list a Zimbra vulnerability exploited by Russian hackers in attacks targeting NATO...
CISA orders agencies to patch Backup Exec bugs used by ransomware gang
On Friday, U.S. Cybersecurity and Infrastructure Security Agency (CISA) increased by five its list of security issues that threat actors have used in attacks, three of...
Phishing from threat actor TA473 targets US and NATO officials
on April 7, 2023, 1:59 PM EDT Phishing from threat actor TA473 targets US and NATO officials These phishing campaigns are exploiting a Zimbra vulnerability and...
More phishing campaigns are using IPFS network protocol
Learn how IPFS is used in phishing attacks and why it’s especially tricky to remove the impacted pages, as well as how to protect from this...
Cyberespionage threat actor APT43 targets US, Europe, Japan and South Korea
Image: Getty Images/iStockphoto/bluebay2014 Security research from Mandiant and Google indicates that targeting by APT43 and its subset Archipelago aligns with North Korean interests. Jump to: Who...
Company that launched 2FA is pioneering AI for digital identity
Image: Who is Danny/Adobe Stock Joe Burton, CEO of digital identity authentication company Telesign, spoke with TechRepublic about how the “fuzzy” realm between statistical analysis and...
Apple addressed two actively exploited zero-day flaws
Apple released emergency security updates to address two actively exploited zero-day vulnerabilities impacting iPhones, Macs, and iPads. Apple has released emergency security updates to address two...
Microsoft aims at stopping cybercriminals from using cracked copies of Cobalt Strike
Microsoft announced it has taken legal action to disrupt the illegal use of copies of the post-exploitation tool Cobalt Strike by cybercriminals. Cobalt Strike is a paid...
Almost Half of Former Employees Say Their Passwords Still Work
An alarming number of organizations are not properly offboarding employees when they leave, especially in regard to passwords. In a March PasswordManager.com survey of 1,000 U.S....
Microsoft, Fortra & Health-ISAC Team Up to Remove Illicit Cobalt Strike Tools
Microsoft’s Digital Crimes Unit (DCU), security software vendor Fortra, and the Health Information Sharing and Analysis Center (Health-ISAC), have joined forces to remove cracked legacy copies...
TikTok, Other Mobile Apps Violate Privacy Regulations
The popular and increasingly controversial social media app TikTok must pay a fine of 12.7 million pounds (equivalent to around $16 million) in the UK for...
Printers Pose Persistent Yet Overlooked Threat
A rash of printer-related vulnerabilities in 2023 have punctuated security expert warnings that printers continue to be a significant source of vulnerability within companies — especially...
Bad Actors Will Use Large Language Models — but Defenders Can, Too
AI is dominating headlines. ChatGPT, specifically, has become the topic du jour. Everyone is taken by the novelty, the distraction. But no one is addressing the elephant...
US Space Force Requests $700M for Cybersecurity Blast Off
US Space Force top brass have requested a $700 million investment in cybersecurity as part of the military branch’s overall $30 billion 2024 budget. The Russian...
Friday Squid Blogging: Squid Food Poisoning
University of Connecticut basketball player Jordan Hawkins claims to have suffered food poisoning from calamari the night before his NCAA finals game. The restaurant disagrees: On...
AI and cyber security: Trends, challenges and future prospects
Yaniv Shechtman has over 15 years of expertise in cyber security, AI, and product management. At Check Point, Yaniv’s primary responsibility is to shape Check Point’s...
Microsoft leads global crackdown against Cobalt Strike, protecting healthcare from ransomware
EXECUTIVE SUMMARY: Microsoft, the Health Information Sharing and Analysis Center (Health-ISAC) and other partners have announced a widespread technical and legal crackdown against servers hosting “cracked”...
Best Patch Management Practices to Follow to Keep Your Business Secured
Patch management is an essential practice for businesses to maintain the security and stability of their IT infrastructure. Patches are released by software vendors to fix...
Cyber Incident Cripples UK Criminal Records Office
After weeks of silence, the UK’s Criminal Records Office (ACRO) has issued a statement saying that the issues with the website that have been ongoing since...