Advertisement

social media - collaboration tools - communication

How to build a public profile as a cybersecurity pro

High-profile cybersecurity professionals share their paths, tips, and learnings for those interested in creating a personal brand.


A graph with abstract rates and values sharply declines. [losses / crisis / crash]

Financial services increasingly targeted for API-based cyberattacks

API-based attacks are sharply on the rise, as cybercriminals take aim at the financial services industry, according to a new report from Akamai.


Email encryption  >  An encrypted binary 'at' symbol with a keyhole.

AWS releases Wickr, its encrypted messaging service for enterprises

The release of the enterprise version of the encrypted messaging service, announced at AWS re:Invent, is designed to allow secure collaboration across messaging, voice, video and file sharing.


Advertisement

malicious email with skull and crossbones

Website offering spoofing services taken offline after joint operation

Law enforcement authorities in Europe, Australia and North America have arrested 142 people in connection with a website that allowed criminals to steal $120 million from victims that had fallen foul of spoofing campaigns.


European Union, EU

EU Council adopts NIS2 directive to harmonize cybersecurity across member states

The NIS2 directive replaces NIS as EU Council seeks to improve resilience and incident response capacities in the EU.


WhatsApp secure messaging on a mobile phone

500 million WhatsApp mobile numbers up for sale on the dark web

The seller claims to have data of users from over 84 countries, including US, UK, India, Egypt, Mexico and Russia.


Hacking stealing password data

Here is why you should have Cobalt Strike detection in place

Abusing variants of legitimate penetration testing tools has become a standard tactic for many attackers seeking to fool security teams. Cobalt Strike is among the attack frameworks used by red teams and cyber specialists should be on...


A circuit key at the center of a system of integrated security: endpoints/devices/networks/apps/etc.

Top 7 CIAM tools

Customer identity and access management (CIAM) is the basis to improve management and control of third parties’ access to a business. Here are the top seven CIAM tools currently in the market.


credit card theft / credit card fraud / credit card hack

Cybercriminals are increasingly using info-stealing malware to target victims

In the first seven months of this year, threat actors stole over 50 million passwords, 2 billion cookie files, details of 103,150 bank cards, and data from 113,204 crypto wallets. 


big data merger and acquisition big business smb

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.


Advertisement

malvertising malware hacked ads advertising online

DUCKTAIL malware campaign targeting Facebook business and ads accounts is back

The spear phishing group has revised its tactics and is employing more sophisticated techniques and tactics based on what appears to be extensive research into Facebook business and ads management accounts.


security system vulnerabilities - a grid of locks with several unlocked

EPSS explained: How does it compare to CVSS?

The Exploit Prediction Scoring System has its shortcomings, but it can complement CVSS to help better prioritize and assess vulnerability risk.


Social engineering  >  Laptop user with horns manipulates many social media accounts

Meta outlines US involvement in social media disinformation in new report

The social media giant’s latest quarterly adversarial threat report describes three coordinated disinformation networks, one of which appears to originate from the US.


joe biden cyberceomeeting public domain wh

The Biden administration has racked up a host of cybersecurity accomplishments

The Biden administration’s intense focus on cybersecurity has resulted in an unprecedented number of initiatives. Although domestic efforts seem well-baked, opportunities exist for further leadership in the international arena.


uk and south korea flags

UK finalizes first independent post-Brexit data transfer deal with South Korea

UK organizations will be able to securely transfer personal data to the Republic of Korea without restrictions by the end of 2022.