Threat Intelligence

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns 2024-04-12 at 17:46 By SecurityWeek News Noteworthy stories that might have slipped under the radar: Moscow sewage system hacked, a new women in cybersecurity report, PasteHub domain seized by law enforcement.  The post In Other News: Moscow Sewage Hack, Women in Cybersecurity …

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns Read More »

React to this headline:

Loading spinner

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program 2024-04-11 at 16:31 By Marc Solomon With automated, detailed, contextualized threat intelligence, organizations can better anticipate malicious activity and utilize intelligence to speed detection around proven attacks. The post Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program …

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program Read More »

React to this headline:

Loading spinner

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 2024-03-28 at 13:16 By Kevin Townsend In just the first two months of 2024, threat intelligence firm Flashpoint has logged dramatic increases in all major threat indicators. The post Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 appeared first …

Threat Indicators Show 2024 is Already Promising to be Worse Than 2023 Read More »

React to this headline:

Loading spinner

How threat intelligence data maximizes business operations

How threat intelligence data maximizes business operations 2024-03-26 at 07:02 By Help Net Security Threat intelligence is no longer a ‘nice to have’ for organizations but a ‘must,’ as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives organizations a new …

How threat intelligence data maximizes business operations Read More »

React to this headline:

Loading spinner

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance 2024-03-21 at 15:46 By Marc Solomon The next twelve months will see the implementation of several regulations designed to improve cybersecurity standards across various industries. The post Risk and Regulation: Preparing for the Era of Cybersecurity Compliance appeared first on SecurityWeek. This article is an …

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance Read More »

React to this headline:

Loading spinner

Outsmarting cybercriminal innovation with strategies for enterprise resilience

Outsmarting cybercriminal innovation with strategies for enterprise resilience 2024-03-19 at 07:19 By Mirko Zorz In this Help Net Security interview, Pedro Cameirão, Head of Cyber Defense Center at Nokia, discusses emerging cybersecurity trends for 2024 and advises enterprises on preparation strategies. Cameirão will speak at GISEC Global 2024 in Dubai, a conference and exhibition bringing …

Outsmarting cybercriminal innovation with strategies for enterprise resilience Read More »

React to this headline:

Loading spinner

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate 2024-03-15 at 13:10 By Kevin Townsend Red Canary’s 2024 Threat Detection Report is based on analysis of almost 60,000 threats across 216 petabytes of telemetry from over 1,000 customers’ endpoints. The post Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate appeared …

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate Read More »

React to this headline:

Loading spinner

SecurityWeek Cyber Insights 2024 Series

SecurityWeek Cyber Insights 2024 Series 2024-03-11 at 16:01 By Kevin Townsend Cyber Insights 2024 talks to hundreds of industry experts from dozens of companies covering seven primary topics. The post SecurityWeek Cyber Insights 2024 Series appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

State-sponsored hackers know enterprise VPN appliances inside out

State-sponsored hackers know enterprise VPN appliances inside out 2024-02-28 at 14:19 By Zeljka Zorz Suspected Chinese state-sponsored hackers who have been leveraging Ivanti Connect Secure VPN flaws to breach a variety of organizations have demonstrated “a nuanced understanding of the appliance”, according to Mandiant incident responders and threat hunters. They were able to perform a …

State-sponsored hackers know enterprise VPN appliances inside out Read More »

React to this headline:

Loading spinner

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements 2024-02-26 at 18:04 By Marc Solomon Open source is a great way to test the waters and define requirements. But when looking at putting a platform into production, an enterprise-ready solution will ensure you can keep up with business demands. The post …

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements Read More »

React to this headline:

Loading spinner

Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force

Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force 2024-02-21 at 07:31 By Kevin Townsend The ransomware threat is declining as actors pivot to infostealing, according to IBM, which says that attacks on cloud services and critical infrastructures are growing. The post Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force …

Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force Read More »

React to this headline:

Loading spinner

The Ransomware Threat in 2024 is Growing: Report

The Ransomware Threat in 2024 is Growing: Report 2024-01-30 at 19:02 By Kevin Townsend Anyone who believes ransomware will go away doesn’t understand the nature of criminality. Extortion has and always will be a primary criminal business plan. The post The Ransomware Threat in 2024 is Growing: Report appeared first on SecurityWeek. This article is …

The Ransomware Threat in 2024 is Growing: Report Read More »

React to this headline:

Loading spinner

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity 2024-01-29 at 07:32 By Mirko Zorz In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will cover a range of essential aspects, from the importance of continuous adaptation in cybersecurity strategies to practical advice …

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity Read More »

React to this headline:

Loading spinner

Doppel Secures $14M for AI-Powered Brand Protection Technology

Doppel Secures $14M for AI-Powered Brand Protection Technology 2024-01-23 at 15:46 By Ryan Naraine San Francisco startup banks $14 million in Series A funding led by prominent venture capital outfit Andreesen Horowitz (a16z). The post Doppel Secures $14M for AI-Powered Brand Protection Technology appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS …

Doppel Secures $14M for AI-Powered Brand Protection Technology Read More »

React to this headline:

Loading spinner

Sneaky Azorult Back in Action and Goes Undetected

Sneaky Azorult Back in Action and Goes Undetected 2024-01-12 at 17:31 By dakshsharma16 Key Takeaways Overview First identified in 2016, Azorult malware operates as an information-stealing threat, collecting data such as browsing history, cookies, login credentials, and cryptocurrency details. Additionally, it can function as a downloader for other malware families. This malicious software was offered …

Sneaky Azorult Back in Action and Goes Undetected Read More »

React to this headline:

Loading spinner

Embracing offensive cybersecurity tactics for defense against dynamic threats

Embracing offensive cybersecurity tactics for defense against dynamic threats 2024-01-11 at 07:02 By Mirko Zorz In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective offensive security operations and their impact on organizational security strategies. What are the critical steps in creating effective offensive security …

Embracing offensive cybersecurity tactics for defense against dynamic threats Read More »

React to this headline:

Loading spinner

CISA Issues Warning for Russian ‘Star Blizzard’ APT Spear-Phishing Operation

CISA Issues Warning for Russian ‘Star Blizzard’ APT Spear-Phishing Operation 08/12/2023 at 00:48 By Ryan Naraine The US cybersecurity agency calls attention to a Russian APT targeting academia, defense, governmental organizations, NGOs and think-tanks. The post CISA Issues Warning for Russian ‘Star Blizzard’ APT Spear-Phishing Operation appeared first on SecurityWeek. This article is an excerpt …

CISA Issues Warning for Russian ‘Star Blizzard’ APT Spear-Phishing Operation Read More »

React to this headline:

Loading spinner

North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report

North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report 04/12/2023 at 18:16 By Ionut Arghire Recorded Future calculates that North Korean state-sponsored threat actors are believed to have stolen more than $3 billion in cryptocurrency. The post North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report appeared first on SecurityWeek. This …

North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report Read More »

React to this headline:

Loading spinner

CGSI Network Captures the Exploitation of ownCloud Vulnerability- CVE-2023-49103

CGSI Network Captures the Exploitation of ownCloud Vulnerability- CVE-2023-49103 30/11/2023 at 19:32 By cybleinc CGSI captures the active exploitation of ownCloud’s critical vulnerability CVE-2023-49103. The post CGSI Network Captures the Exploitation of ownCloud Vulnerability- CVE-2023-49103 appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this headline:

React to this headline:

Loading spinner

Meta Takes Action Against Multiple Foreign Influence Campaigns

Meta Takes Action Against Multiple Foreign Influence Campaigns 30/11/2023 at 17:46 By Kevin Townsend Meta removed three foreign influence operations from the Facebook platform during Q3, 2023. Two were Chinese in origin, and one was Russian, the company says.  The post Meta Takes Action Against Multiple Foreign Influence Campaigns appeared first on SecurityWeek. This article …

Meta Takes Action Against Multiple Foreign Influence Campaigns Read More »

React to this headline:

Loading spinner
Scroll to Top