Cycode rolls out ASPM connector marketplace, analysts see it as bare minimum
Cycode has announced what it called the first marketplace devoted to the application security posture management (ASPM) space, touting the availability of more than 100 connectors and integrations to...
View ArticleCyber resilience: A business imperative CISOs must get right
In May 2021, when Colonial Pipeline was targeted by the DarkSide hackers, CEO Joseph Blount made the highly controversial decision to pay the $4.4 million ransom. The attack put critical US...
View ArticleUS AI experts targeted in cyberespionage campaign using SugarGh0st RAT
Security researchers have warned about a new cyberespionage campaign that targets artificial intelligence experts working in private industry, government and academia. The attackers, likely of Chinese...
View ArticleFCC proposes BGP security measures
Jessica Rosenworcel wants ISPs to tell her how they’re securing BGP (Border Gateway Protocol) , a critical system for routing internet traffic. The chairwoman of the US Federal Communications...
View ArticleDDoS attacks: Definition, examples, and techniques
What is a DDoS attack? A distributed denial of service (DDoS) attack is when an attacker, or attackers, attempt to make it impossible for a service to be delivered. This could be sending a web server...
View ArticleSEC rule for finance firms boosts disclosure requirements
The SEC announced rule changes for some financial companies that will require more customer disclosures when security incidents impact their personal information as well as mandate incident response...
View ArticleThe inside story of Cyber Command’s creation
In June 2009, the Department of Defense created US Cyber Command to address the rapid recognition among military brass that the computer systems they used were increasingly vulnerable to cyberattacks....
View ArticleGlobal stability issues alter cyber threat landscape, ESET reports
Threat actors are boosting attacks across the globe, with geographic events influencing which regions are being hit the hardest, according to a new report from threat intel researchers ESET. Although...
View ArticleDownload the hybrid cloud data protection enterprise buyer’s guide
To safeguard your data in hybrid cloud environments, organizations need to apply basic data security techniques such as encryption, data-loss prevention, secure web gateways, and cloud-access security...
View ArticleEmployee discontent: Insider threat No. 1
In the world of insider risk management (IRM), how an employee views their relationship with their company is as important as how the company views its relationship with the employee. This might sound...
View ArticleMemcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From...
Memcyco Inc., provider of digital trust technology designed to protect companies and their customers from digital impersonation fraud, released its inaugural 2024 State of Website Impersonation Scams...
View ArticleRise of zero-day exploits reshape security recommendations
With zero-day attacks rapidly eclipsing exploits of known flaws, CISOs face the specter of having to switch up their security strategies in favor of post-exploitation response. That’s the key takeaway...
View ArticleMicrosoft Azure’s Russinovich sheds light on key generative AI threats
Generative AI-based threats operate over a huge landscape, and CISOs must look at it from a variety of perspectives, said Microsoft Azure CTO Mark Russinovich during Microsoft Build conference this...
View ArticleUS government could mandate quantum-resistant encryption from July
Companies working on sensitive projects for the US government may soon be required to use encryption algorithms that protect their data and technology from quantum computer attacks. In July, the...
View ArticleMemcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From...
Memcyco Inc., provider of digital trust technology designed to protect companies and their customers from digital impersonation fraud, released its inaugural 2024 State of Website Impersonation Scams...
View ArticleEU resilience regulation DORA has financial CISOs waiting for answers
It just over seven months, the Digital Operational Resilience Act (DORA) enters into force in the EU — and not every organization is prepared. The regulation, which will apply as of January 17, 2025,...
View ArticleHijack of monitoring devices highlights cyber threat to solar power...
In what might be the first publicly confirmed cyberattack on the solar power grid infrastructure, Japanese media recently reported that malicious actors hijacked 800 SolarView Compact remote...
View ArticleCritical flaw found in Fluent Bit cloud services monitoring component
Security researchers at Tenable have discovered a potentially critical memory corruption vulnerability in Fluent Bit, a core component in the monitoring infrastructure of many cloud services. The...
View ArticleFake Pegasus spyware source code floods dark web
Cybercriminals are exploiting the notoriety of NSO Group’s Pegasus spyware to dupe victims on the dark web, according to cybersecurity firm CloudSEK. This revelation comes just weeks after Apple...
View Article