Protecting Against Business Email Compromise (BEC): A Comprehensive Guide
Business Email Compromise (BEC) attacks have emerged as one of the most sophisticated and financially devastating forms of cybercrime. The latest FBI Internet Crime (IC3) Report reveals that BEC...
View ArticleWant to get ahead? Four activities that can enable a more proactive security...
Hockey legend Wayne Gretzky famously shared his secret to success on the ice: “I skate to where the puck is going to be, not where it has been.” Security teams would do well to embrace Gretzky’s...
View ArticleAvis reports data breach affecting 300,000 customers
Car rental company Avis has informed around 300,000 of its customers in the US that their personal data has been stolen in a cyberattack. The company detected unauthorized access to one of its...
View ArticleThird-party risk management can learn a lot from the musk ox
Third-party risk management is a significant CISO challenge with deep business consequences. When a key third-party supplier succumbs to cyberattack, operations can grind to a halt. In healthcare and...
View ArticleChina-based cyber espionage campaign in SE Asia is expanding, says Sophos
CISOs in Southeast Asia should be on alert after the discovery that a suspected Chinese-based cyber espionage campaign that started last year is expanding its scope. The warning today comes from...
View ArticleUS targets advanced AI and cloud firms with new reporting proposal
The US Department of Commerce’s Bureau of Industry and Security (BIS) plans to introduce mandatory reporting requirements for developers of advanced AI models and cloud computing providers. The...
View ArticleANZ CIOs see cybersecurity as top priority for 2025
Managing cybersecurity and other technology risks will be top of mind for CIOs in 2025 across Australia and New Zealand (ANZ), with 82% of 109 respondents saying it is a key priority for next year,...
View ArticleUS quantum computing lead over China threatened by weakness in commercialization
The US leads the world in quantum computing research, but it will need more government investment to maintain its lead over China, an assessment by the Information Technology and Innovation Foundation...
View ArticleImmediate threats or long-term security? Deciding where to focus is the...
Cybersecurity has become a high-stakes balancing act — the modern CISO is under constant pressure to protect their organization from the latest threats, including ransomware and phishing, while also...
View Article12 dark web monitoring tools
What is dark web monitoring? Dark web monitoring is a service often offered by cybersecurity vendors that scans the dark web for information pertaining to an organization. These software scan and...
View ArticleMicrosoft warns of bug reversing updates on old Windows 10, patches critical...
In a busy Patch Tuesday update, Microsoft addressed over 70 security vulnerabilities across various products, including Windows, Office, and Azure. However, the company also acknowledged a critical...
View ArticleTLS security subverted due to CA use of outdated WHOIS servers
WHOIS clients across the internet, including those used by email servers and Certificate Authorities (CAs), are relying on outdated records for WHOIS servers, potentially allowing attackers to hijack...
View ArticleOracle adds Zero Trust Packet Routing capability to its cloud platform
Oracle has added a new zero trust capability to its cloud platform which it says prevents corporate data from being inadvertently exposed through network misconfigurations. Zero Trust Packet Routing...
View Article5G and SASE: Reimagining WAN Infrastructure
Cellular connectivity was often relegated to a failover connection option. Because of its mobile or remote nature, 5G was used as a primary connection for vehicle fleets, IoT devices, and remote...
View ArticleApplication detection and response is the gap-bridging technology we need
The concept of detection and response is far from new in cybersecurity — in fact, it’s a core part of the NIST Cybersecurity Framework (CSF) and a fundamental part of any sound cybersecurity program....
View ArticleThe 18 biggest data breaches of the 21st century
In today’s data-driven world, data breaches can affect hundreds of millions or even billions of people at a time. Digital transformation has increased the supply of data moving, and data breaches have...
View ArticleTransport for London continues to struggle with cyber attack
Transport for London, which manages public transport for the British capital, continues to experience technical disruptions from a cyberattack on September 1. It reported the cyberattack at the...
View ArticleFake recruitment campaign targets developers using trojanized Python packages
The number of attacks looking to compromise developer machines has exploded in recent years. There has been a barrage of malicious packages uploaded to public registries such as PyPi and npm,...
View ArticleToo many companies use non-enterprise grade remote access tools in their OT...
In May 2020, Iranian attackers attempted to alter chlorine levels in drinking water in a cyber attack against an Israeli water utility, and in February 2021, a hacker actually accessed a Florida...
View ArticleMastercard acquires Recorded Future: How will threat intelligence transform...
As cyber criminals grow ever more crafty with their tactics, enterprises are increasingly turning to threat intelligence, which — much like military threat intelligence — involves collecting,...
View Article