Industry News
-
RSAC: Threat Actors Weaponize Hacktivism for Financial GainRecorded Future’s Alexander Leslie highlights the increasingly blurred lines between hacktivism, financial cybercrime and nation-state activities during the RSA Conference 2024... Read More
-
#RSAC: Law Enforcement Takedowns Force Ransomware Affiliates to DiversifyA new Chainalysis report showed that recent law enforcement operations have pushed ransomware affiliates to increasingly use multiple strains in order to stay afloat... Read More
-
#RSAC: 70% of Businesses Prioritize Innovation Over Security in Generative AI ProjectsAn IBM report found that most organizations are exposing themselves to security risks when implementing generative AI tools... Read More
-
North Korean Hackers Spoofing Journalist Emails to Spy on Policy ExpertsThe US warns that the North Korea-linked Kimsuky group is exploiting poorly configured DMARC protocols to spoof legitimate domains in espionage phishing campaigns... Read More
-
Indonesia is a Spyware Haven, Amnesty International FindsAmnesty International found in Indonesia a murky ecosystem of surveillance suppliers, brokers and resellers that obscures the sale and transfer of surveillance technology... Read More
-
Android Flaw Affected Apps With 4 Billion InstallsMicrosoft illustrated the severity of the issue via a case study involving Xiaomi’s File Manager... Read More
-
Hackers Target New NATO Member Sweden with Surge of DDoS AttacksSweden experienced a wave of DDoS attacks as the country was working towards joining NATO, Netscout found... Read More
-
Three-Quarters of CISOs Admit App Security IncidentsDynatrace research claims global CISOs are concerned AI is driving advanced app security threats and poor developer practices... Read More
-
Security Breach Exposes Dropbox Sign UsersAttackers accessed emails, usernames, phone numbers, hashed passwords and authentication information... Read More
-
REvil Ransomware Affiliate Sentenced to Over 13 Years in PrisonA US court has sentenced a Ukrainian national to 13 years and seven months in prison for his role in over 2500 ransomware attacks using... Read More
-
US and UK Warn of Disruptive Russian OT AttacksThe US and its allies claim Russian hacktivists are disruptive operations in water, energy, food and agriculture sectors... Read More
-
LockBit, Black Basta, Play Dominate Ransomware in Q1 2024The data from ReliaQuest also suggests LockBit faced a significant setback due to law enforcement action... Read More
-
UnitedHealth CEO Confirms Breach Tied to Stolen Credentials, No MFAAndrew Witty made the claims in a written testimony submitted before a House subcommittee hearing... Read More
-
1 in 5 US Ransomware Attacks Triggers LawsuitComparitech found that 18% of ransomware incidents in the US led to a lawsuit in 2023, with 59% of completed lawsuits since 2018 proving successful... Read More
-
Lawsuits and Company Devaluations Await For Breached FirmsNew report from Netwrix reveals unplanned expenses impact half of breached firms, including a surge in lawsuits... Read More
-
DBIR: Vulnerability Exploits Triple as Initial Access Point for Data BreachesThe growth of software supply chain attacks pushed vulnerability exploits to the third most used initial access method, Verizon found... Read More
-
Infosecurity Europe Keynote: Building Strong Teams and Driving Change with F1’s Claire WilliamsJoin Claire Williams at Infosecurity Europe to learn how F1 leadership strategies can inspire cybersecurity leaders... Read More
-
NCSC’s New Mobile Risk Model Aimed at “High-Threat” FirmsThe UK’s National Cyber Security Centre claims its AMS model will protect firms from state-backed mobile threats... Read More
-
US Government Releases New Resources Against AI ThreatsThe US Department of Homeland Security has released new guidelines for securing critical infrastructure and CBRN from AI threats... Read More
-
Ransomware Rising Despite Takedowns, Says Corvus ReportThe first quarter of 2024 saw the most ransomware activity ever recorded, Corvus Insurance found in a new analysis... Read More
-
YMCA Fined for Data Breach, ICO Raises Concerns About Privacy for People with HIVCentral YMCA was fined £7,500 for a data breach exposing HIV information of support program participants, prompting the ICO to call for stronger privacy protections... Read More
-
Millions of Malicious Containers Found on Docker HubAccording to JFrog, approximately 25% of all repositories lack useful functionality and serve as vehicles for spam and malware... Read More
-
Disinformation: EU Opens Probe Against Facebook and Instagram Ahead of ElectionMeta’s moderation failings could allow coordinated disinformation campaigns to thrive in the run-up to the EU election... Read More
-
Ransom Payments Surge by 500% to an Average of $2mSophos found that the average ransom payment was $2m in 2023, with 63% of ransom demands $1m or more... Read More
-
McAfee and Intel Collaborate to Combat Deepfakes with AI-Powered Deepfake DetectionIn a world where deepfake scams and misinformation are on the rise, McAfee has announced significant enhancements to its AI-powered... The post McAfee and Intel... Read More
-
Why Do I Need a Password Manager?In today’s digital age, we know the importance of online privacy and security. However, with an increasing number of websites requiring passwords, it becomes tough... Read More
-
McAfee Dominates AV-Comparatives PC Performance TestIn our digital age, a computer is not just a tool; it’s a gateway to a world of possibilities, entertainment,... The post McAfee Dominates AV-Comparatives... Read More
-
How to Protect Yourself from Bank FraudMore and more transactions occur over the internet rather than at a teller’s window, and nearly every account has a username, password, and PIN associated... Read More
-
What Is a Data Broker?A data broker is an organization that makes money by collecting your personal information, analyzing it, and licensing it out to... The post What Is a... Read More
-
The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade SmartscreenAuthored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with... The post The Darkgate Menace:... Read More
-
How to Delete Your Browser HistoryUntil recently, people had little control over how companies used their online data. But, with data privacy now a human... The post How to Delete... Read More
-
How to Protect Your Personal DataAll your online activity creates a trail of data. And that data tells a story. The story of you. The... The post How to Protect... Read More
-
How to Remove Personal Information From Data Broker SitesData brokers are companies that collect your information from a variety of sources to sell or license it out to... The post How to Remove... Read More
-
How to Avoid Romance ScamsIt’s the romance scam story that plays out like a segment on a true crime show. It starts with a... The post How to Avoid... Read More
-
To fight cyber extortion and ransomware, shift leftHow can organizations defend themselves more effectively against ransomware and other forms of cyber extortion? By “shifting left” and adopting proactive cybersecurity strategies to detect... Read More
-
Inside the 2022 Email Cyber Threat LandscapeKey trends and predictions you should know about... Read More
-
Attack on Security Titans: Earth Longzhi Returns With New TricksAfter months of dormancy, Earth Longzhi, a subgroup of advanced persistent threat (APT) group APT41, has reemerged using new techniques in its infection routine. This... Read More
-
To Keep Up With Cybersecurity Laws, Go 'Federal First'With new cybersecurity laws and regulations rolling out, the best way to maintain broad compliance is to align with the most stringent frameworks. In the... Read More
-
Global Cyber Risk Lowers to Moderate Level in 2H' 2022Trend’s seventh edition of the Cyber Risk Index (CRI) reveals an in-depth analysis of cyber threat and vulnerabilities... Read More
-
Rapture, a Ransomware Family With Similarities to ParadiseIn March and April 2023, we observed a type of ransomware targeting its victims via a minimalistic approach with tools that leave only a minimal... Read More
-
SSL vs. TLS: Which should you be using?You may wonder if you should choose SSL or TLS to secure your network. Explore the differences between the two communications protocols, use cases where... Read More
-
Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active ExploitationTwo vulnerabilities in PaperCut have been found, and one of them is being actively exploited in the wild. This blog entry provides a summary of... Read More
-
Attackers Use Containers for Profit via TrafficStealerWe found TrafficStealer abusing open container APIs in order to redirect traffic to specific websites and manipulate engagement with ads.... Read More
-
Achieving Cloud Compliance Throughout Your MigrationPart of a secure cloud migration strategy is ensuring compliance of all the moving pieces. Just like your cloud journey, cloud compliance isn’t all about... Read More