social media network interaction

North Korean threat actor APT43 pivots back to strategic cyberespionage

The APT43 group is highly adept at using social engineering to target individuals and extract sensitive information.

shutterstock 1850095465 internet API application programming interface

Noname Security releases API security updates

The latest API security upgrades from Noname focus on expanded testing and discovery.

blocking spam e mail warning pop up phishing mail network security laptop computer

HP releases Wolf Connect solution for secure remote PC management

HP releases Wolf Connect solution for secure remote PC management


1798109056 decision making ciso soc

Latin American companies, governments need more focus on cybersecurity

A new report shows the growing impact cyberattacks have on Latin American economies. Governments and organizations can do more.

access management / access control / user connections / identities

Spera exits stealth to reveal identity-based threat hunting capabilities

Spera’s ISPM capabilities provides a comprehensive inventory of a customer’s identities, permissions and environments to surface critical anomalies.

passwordless header

Legacy, password-based authentication systems are failing enterprise security, says study

Sixty percent of respondents hit by an authentication-related cyberattack in the last 12 months agreed that they could have avoided it with a passwordless system.


Skyhawk adds ChatGPT functions to enhance cloud threat detection, incident discovery

Cloud threat detection and response vendor has applied ChatGPT features to its platform in two distinct ways — earlier detection of malicious activity and explicability of attacks as they progress.

CIO | Middle East  >  Israel  >  Flag

DarkBit puts data from Israel’s Technion university on sale

DarkBit had previously demanded 80 bitcoins as ransom, and said it would sell the data within five days if the ransom went unpaid.

ai in retail 1000x630

5 cyber threats retailers are facing — and how they’re fighting back

Ransomware, point-of-sale hacks, and supply chain threats are just a few of the worries for today’s retailers. The stakes are high when you’re handling big money and reams of consumer data.

Group of people working together and collaborating in a shared office workspace.

AI-fueled search gives more power to the bad guys

How to stay ahead of attacks by learning about the risks of AI-based search engines, what skill sets are needed to defend systems and ensuring employees can learn to use AI tools safely without inviting attackers in.


group programmers team workers collaboration

Managing security in the cloud through Microsoft Intune

Microsoft’s cloud-based endpoint management service extends Active Directory features to Microsoft Azure cloud.

Wired brain illustration - next step to artificial intelligence

Microsoft announces generative AI Security Copilot

Microsoft’s new generative AI security system grafts GPT-4 into its security offerings for integrated analysis and responses.

cso security hacker breach privacy ransomware malware attack gettyimages 1216075693 by towfiqu aham

Hackers changed tactics, went cross-platform in 2022, says Trend Micro

Ransomware groups are adopting corporate structures, Microsoft macros are no longer an easy target, and the Rust programming language is making it easier to write multiplatform malware.

Insider threats  >  Employees suspiciously peering over cubicle walls

Data loss from insider events increase despite IRM programs, says study

Insider risks are difficult to detect, manage and mitigate and can easily evade lackluster, low-budget insider risk management programs with an inadequate training regime.

1798109056 decision making ciso soc

5 ways to tell you are not CISO material

Cybersecurity professionals looking at the top job have the technical skills to be come a CISO but may wonder if they have what it takes to lead a team while ensuring management and board support. Here are five ways to tell if you are...