Tool used by ransomware groups now seen killing EDR: Report
Defenders are being warned that a tool used by several ransomware gangs to sabotage the functions of endpoint protection software has been updated, with at least one attacker using a new capability to...
View ArticleBlackByte ransomware gang exploits more orgs than previously known
According to security researchers, the BlackByte ransomware group has been more active in exploiting organizations than previously thought. Security researchers from Cisco Talos have found evidence...
View Article5 best practices for running a successful threat-informed defense in...
If you’ve been in cybersecurity for the past five to 10 years, you’ve probably heard the term “threat-informed defense.” Simply stated, a threat-informed defense focuses security teams, technologies,...
View ArticleThe US offers a $2.5M bounty for the arrest of Angler Exploit Kit co-distributor
The US Department of State is offering a reward of $2.5 million for information leading to the arrest of Volodymyr Kadariya, the cybercriminal associated with an alleged scheme to transmit the Angler...
View ArticleTelegram CEO allowed platform to be abused by criminals, French prosecutors...
Days on from his arrest at Paris Le Bourget airport last Saturday, it looks as if Telegram founder and CEO Pavel Durov will be spending more time in France than he bargained for. On Wednesday, French...
View ArticleGoogle ups bug bounties for ‘high quality’ Chrome hunters
Google has announced new compensation incentives for people who find vulnerabilities in the Chrome browser as part of the company’s Chrome Vulnerability Reward Program (VRP). The increases to its...
View ArticleIranian threat actors targeting businesses and governments, CISA, Microsoft warn
Warnings went out this week to infosec leaders about two groups of Iranian threat actors attacking American and other organizations. The US Cybersecurity and Infrastructure Security Agency (CISA), the...
View ArticleF5, Intel team up to boost AI delivery, security
F5 this week said it’s working with Intel to offer customers a way to develop and securely deliver AI-based inference models and workloads. Specifically, the companies will combine the security and...
View ArticleFortinet expands security lineup with sovereign SASE
The concept of the secure access service edge (SASE) is one that many organizations have embraced in recent years. A challenge for some enterprise adopters, however, is a lack of control, as some SASE...
View ArticleThe CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have...
View Article15 infamous malware attacks: The first and the worst
Viruses and other malware spreading for sinister or baffling reasons has been a staple of cyberpunk novels and real-life news stories alike for decades. And in truth, there have been computer viruses...
View ArticleRansomware feared in the cyberattack on US oil services giant
The August 21 cyberattack on the US oilfield services contractor Halliburton is now feared to be a ransomware attack, according to an email reportedly sent to the company’s suppliers. BleepingComputer...
View ArticleLLMs fueling a “genAI criminal revolution” according to Netcraft report
Like seemingly everyone else, threat actors are increasingly adopting generative artificial intelligence (genAI) as a business tool. Recent findings by security researchers at Netcraft have revealed...
View ArticleWomen in Cyber Day finds those it celebrates ‘leaving in droves’
The information security industry has been trying for years to improve the participation of and respect for women in the cyber community, with some rising to CSO positions. But with International...
View ArticleRansomware recovery: 8 steps to successfully restore from backup
According to a Sophos survey of 5,000 IT and cybersecurity leaders released in April, 59% of organizations have been hit by a ransomware attack in 2023, from which 56% paid a ransom to get their data...
View ArticleNorth Korean hackers actively exploited a critical Chromium zero-day
A zero-day flaw in open source browser, Chromium, which was patched recently, was exploited by a financially motivated North Korean threat actor, Citrine Sleet, to deliver the FudModule rootkit. The...
View ArticleHow to ensure cybersecurity strategies align with the company’s risk tolerance
Aligning an organization’s appetite for risk with cybersecurity strategies is a critical challenge CISOs face, one that requires balancing technical controls and business needs. Achieving that balance...
View ArticleCloud providers must own up to their part in the current state of insecurity
The shared responsibility model has been foundational to cybersecurity from the start. But modern developments and complications, especially in the cloud, are beginning to erode our ability to truly...
View Article6 things hackers know that they don’t want security pros to know that they know
Security professionals have good insights into the technical tactics, techniques, and procedures (TTPs) that threat actors use to launch cyberattacks. They are likewise well-versed in key defensive...
View Article12 hottest IT security certs for higher pay today
Security professionals understand that certifications matter. Apart from a technical exam, there is no quicker way to gauge a person’s ability than to examine their certifications. Despite this fact,...
View Article