Threat Intelligence

SecurityWeek Cyber Insights 2024 Series

SecurityWeek Cyber Insights 2024 Series 2024-03-11 at 16:01 By Kevin Townsend Cyber Insights 2024 talks to hundreds of industry experts from dozens of companies covering seven primary topics. The post SecurityWeek Cyber Insights 2024 Series appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

SecurityWeek Cyber Insights 2024 Series Read More »

State-sponsored hackers know enterprise VPN appliances inside out

State-sponsored hackers know enterprise VPN appliances inside out 2024-02-28 at 14:19 By Zeljka Zorz Suspected Chinese state-sponsored hackers who have been leveraging Ivanti Connect Secure VPN flaws to breach a variety of organizations have demonstrated “a nuanced understanding of the appliance”, according to Mandiant incident responders and threat hunters. They were able to perform a

React to this headline:

Loading spinner

State-sponsored hackers know enterprise VPN appliances inside out Read More »

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements 2024-02-26 at 18:04 By Marc Solomon Open source is a great way to test the waters and define requirements. But when looking at putting a platform into production, an enterprise-ready solution will ensure you can keep up with business demands. The post

React to this headline:

Loading spinner

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements Read More »

Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force

Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force 2024-02-21 at 07:31 By Kevin Townsend The ransomware threat is declining as actors pivot to infostealing, according to IBM, which says that attacks on cloud services and critical infrastructures are growing. The post Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force

React to this headline:

Loading spinner

Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force Read More »

The Ransomware Threat in 2024 is Growing: Report

The Ransomware Threat in 2024 is Growing: Report 2024-01-30 at 19:02 By Kevin Townsend Anyone who believes ransomware will go away doesn’t understand the nature of criminality. Extortion has and always will be a primary criminal business plan. The post The Ransomware Threat in 2024 is Growing: Report appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

The Ransomware Threat in 2024 is Growing: Report Read More »

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity 2024-01-29 at 07:32 By Mirko Zorz In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will cover a range of essential aspects, from the importance of continuous adaptation in cybersecurity strategies to practical advice

React to this headline:

Loading spinner

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity Read More »

Doppel Secures $14M for AI-Powered Brand Protection Technology

Doppel Secures $14M for AI-Powered Brand Protection Technology 2024-01-23 at 15:46 By Ryan Naraine San Francisco startup banks $14 million in Series A funding led by prominent venture capital outfit Andreesen Horowitz (a16z). The post Doppel Secures $14M for AI-Powered Brand Protection Technology appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Doppel Secures $14M for AI-Powered Brand Protection Technology Read More »

Sneaky Azorult Back in Action and Goes Undetected

Sneaky Azorult Back in Action and Goes Undetected 2024-01-12 at 17:31 By dakshsharma16 Key Takeaways Overview First identified in 2016, Azorult malware operates as an information-stealing threat, collecting data such as browsing history, cookies, login credentials, and cryptocurrency details. Additionally, it can function as a downloader for other malware families. This malicious software was offered

React to this headline:

Loading spinner

Sneaky Azorult Back in Action and Goes Undetected Read More »

Embracing offensive cybersecurity tactics for defense against dynamic threats

Embracing offensive cybersecurity tactics for defense against dynamic threats 2024-01-11 at 07:02 By Mirko Zorz In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective offensive security operations and their impact on organizational security strategies. What are the critical steps in creating effective offensive security

React to this headline:

Loading spinner

Embracing offensive cybersecurity tactics for defense against dynamic threats Read More »

CISA Issues Warning for Russian ‘Star Blizzard’ APT Spear-Phishing Operation

CISA Issues Warning for Russian ‘Star Blizzard’ APT Spear-Phishing Operation 08/12/2023 at 00:48 By Ryan Naraine The US cybersecurity agency calls attention to a Russian APT targeting academia, defense, governmental organizations, NGOs and think-tanks. The post CISA Issues Warning for Russian ‘Star Blizzard’ APT Spear-Phishing Operation appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

CISA Issues Warning for Russian ‘Star Blizzard’ APT Spear-Phishing Operation Read More »

North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report

North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report 04/12/2023 at 18:16 By Ionut Arghire Recorded Future calculates that North Korean state-sponsored threat actors are believed to have stolen more than $3 billion in cryptocurrency. The post North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report appeared first on SecurityWeek. This

React to this headline:

Loading spinner

North Korean Hackers Have Stolen Over $3 Billion in Cryptocurrency: Report Read More »

CGSI Network Captures the Exploitation of ownCloud Vulnerability- CVE-2023-49103

CGSI Network Captures the Exploitation of ownCloud Vulnerability- CVE-2023-49103 30/11/2023 at 19:32 By cybleinc CGSI captures the active exploitation of ownCloud’s critical vulnerability CVE-2023-49103. The post CGSI Network Captures the Exploitation of ownCloud Vulnerability- CVE-2023-49103 appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this headline:

React to this headline:

Loading spinner

CGSI Network Captures the Exploitation of ownCloud Vulnerability- CVE-2023-49103 Read More »

Meta Takes Action Against Multiple Foreign Influence Campaigns

Meta Takes Action Against Multiple Foreign Influence Campaigns 30/11/2023 at 17:46 By Kevin Townsend Meta removed three foreign influence operations from the Facebook platform during Q3, 2023. Two were Chinese in origin, and one was Russian, the company says.  The post Meta Takes Action Against Multiple Foreign Influence Campaigns appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Meta Takes Action Against Multiple Foreign Influence Campaigns Read More »

Enterprises prepare for the inevitable cyber attack

Enterprises prepare for the inevitable cyber attack 29/11/2023 at 07:31 By Help Net Security Recent IDC research shows that in many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives. In fact, 52% of senior leaders have no involvement in their company’s cyber cases. In this Help Net Security video, Rahul

React to this headline:

Loading spinner

Enterprises prepare for the inevitable cyber attack Read More »

Bad Bots Account for 73% of Internet Traffic: Analysis

Bad Bots Account for 73% of Internet Traffic: Analysis 16/11/2023 at 19:46 By Kevin Townsend The top five categories of Bad Bot attacks are fake account creation, account takeovers, scraping, account management, and in-product abuse. The post Bad Bots Account for 73% of Internet Traffic: Analysis appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Bad Bots Account for 73% of Internet Traffic: Analysis Read More »

Threat Intel: To Share or Not to Share is Not the Question

Threat Intel: To Share or Not to Share is Not the Question 16/11/2023 at 16:46 By Marc Solomon To share or not to share threat intelligence isn’t the question. It’s how to share, what to share, where and with whom. The post Threat Intel: To Share or Not to Share is Not the Question appeared

React to this headline:

Loading spinner

Threat Intel: To Share or Not to Share is Not the Question Read More »

State-Backed Hackers a Threat to Australia, Agency Warns

State-Backed Hackers a Threat to Australia, Agency Warns 15/11/2023 at 13:46 By AFP The AUKUS partnership, with its focus on nuclear submarines and other advanced military capabilities, is likely a target for state actors looking to steal intellectual property. The post State-Backed Hackers a Threat to Australia, Agency Warns appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

State-Backed Hackers a Threat to Australia, Agency Warns Read More »

Organizations should prepare for the inevitability of cyberattacks on their infrastructure

Organizations should prepare for the inevitability of cyberattacks on their infrastructure 15/11/2023 at 07:34 By Help Net Security Organizations reliance on technology has contributed to the fact that their attack surface has grown in size and complexity, according to Armis. Global organizations are facing an unprecedented level of cyber risk due to blind spots in

React to this headline:

Loading spinner

Organizations should prepare for the inevitability of cyberattacks on their infrastructure Read More »

Microsoft Warns of Critical Bugs Being Exploited in the Wild

Microsoft Warns of Critical Bugs Being Exploited in the Wild 14/11/2023 at 23:47 By Ryan Naraine Patch Tuesday: Redmond’s security response team flags two vulnerabilities — CVE-2023-36033 and CVE-2023-36036 — already being exploited in the wild. The post Microsoft Warns of Critical Bugs Being Exploited in the Wild appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Microsoft Warns of Critical Bugs Being Exploited in the Wild Read More »

Product showcase: Red Piranha’s security first, single vendor SASE, collaboration with Intel

Product showcase: Red Piranha’s security first, single vendor SASE, collaboration with Intel 09/11/2023 at 07:01 By Help Net Security Red Piranha has released the latest Crystal Eye consolidated security platform officially in global collaboration with Intel on the 12th of October and more details on the Network Builders Panel with Intel later that month. Crystal

React to this headline:

Loading spinner

Product showcase: Red Piranha’s security first, single vendor SASE, collaboration with Intel Read More »

Scroll to Top