News

A magnifying lens exposes an exploit amid binary code.
network security lock padlock breach

Wired brain illustration - next step to artificial intelligence

Foreign states already using ChatGPT maliciously, UK IT leaders believe

Most UK IT leaders are concerned about malicious use of ChatGPT as research shows how its capabilities can significantly enhance phishing and BEC scams.

cyber attack alarm alert

APT groups use ransomware TTPs as cover for intelligence gathering and sabotage

Changing tactics by North Korean, Russian, and Chinese APT groups suggest that Western companies are at greater risk.

Profile photo of a developer / programmer reviewing code on monitors in his workspace.

New “MITRE ATT&CK-like” framework outlines software supply chain attack TTPs

The OSC&R Framework aims to help security professionals better understand and measure software supply chain risk.

Cloud security threats  >  theft / breach / fraud / phishing

Misconfiguration and vulnerabilities biggest risks in cloud security: Report

About 87% of container images include a high or critical vulnerability, while 90% of granted permissions are not used, according to cybersecurity firm Sysdig.

A multitude of arrows pierce a target. [numerous attacks / quantity / severity]

IoT, connected devices biggest contributors to expanding application attack surface

New report shines light on application security challenges impacting global businesses.

Two developers collaborate on a project as they review code on a display in their workspace.

Guardz debuts with cybersecurity-as-a-service for small businesses

An easy-to-use cybersecurity toolkit from Tel Aviv-based startup Guardz targets small and medium-size businesses (SMBs).

database woman in tablet mobile

Privacera connects to Dremio’s data lakehouse to aid data governance

The integration of open-source based Privacera into Dremio’s data lakehouse is designed to allow joint customer enterprises to manage and organize secure data access.

Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.

Trulioo launches end-to-end identity platform

The new Trulioo platform will combine all existing Trulioo products into a single platform, allowing the ID verification firm to target global enterprise customers.

social engineering fraud impersonation neon face with hoodie by photo by sebastiaan stam on unsplash

Threat actors abuse Microsoft’s “verified publisher” status to exploit OAuth privileges

Proofpoint discovers threat actors targeting verified status in the Microsoft environment to abuse OAuth privileges and lure users into authorizing malicious apps.

international flags / global business discussion

New UN cybercrime convention has a long way to go in a tight timeframe

Nations around the world are hammering out a new cybercrime convention, but some UN members seek to criminalize activities that are not bona fide crimes.

vulnerable breach cyberattack hacker

Hackers abuse legitimate remote monitoring and management tools in attacks

Researchers and government agencies warn that threat actors are increasing their use of commercial RMM tools to enable financial scams.

Ransomware  >  A masked criminal ransoms data for payment.

FBI takes down Hive ransomware group in an undercover operation

FBI covertly infiltrated the Hive network—which has targeted more than 1,500 victims in over 80 countries around the world—and thwarted over $130 million in ransom demands.

cso security hacker breach ransomeware gettyimages 1081349274 by sestovic 2400x1600px

Recent legal developments bode well for security researchers, but challenges remain

Security researchers gained greater federal legal protections over the past two years, but US state laws and China’s recently adopted vulnerability disclosure law pose threats.

binary code, magnifying lens, skull and crossbones

Attackers move away from Office macros to LNK files for malware delivery

Barriers that Microsoft has placed to prevent malicious macros has forced some cybercriminals to use LNK files for malware delivery, but at the cost of easier detection.

man in boat surrounded by sharks risk fear decision attack threat by peshkova getty

Chinese threat actor DragonSpark targets East Asian businesses

The group is seen using SparkRAT, a multi-platform remote access Trojan, to target firms in Hong Kong, Taiwan, China, and Singapore.

recovery gauge [disaster recovery - crisis survival - business continuity]

CYGNVS exits stealth, trumpeting its cyberattack recovery platform

CYGNVS platform promises a playbook, out-of-band connectivity, and more to help organizations recovery from major cyberattacks.

money currency international denominations global currency by metamorworks getty images 1129515470

P-to-P fraud most concerning cyber threat in 2023: CSI

Peer-to-peer fraud and other digital fraud constituted more than 29% of bankers categorizing it as the most worrying cyber threat in 2023, according to CSI.

security vulnerabilities such as hackers and cyberattacks

ServiceNow to detect open source security vulnerabilities with Snyk integration

ServiceNow Vulnerability Response users will now have access to Snyk’s product that scans open source code during the development process.

Load More