Quantcast
Channel: Ivanti warns customers of new critical flaw exploited in the wild | CSO Online
Browsing all 1593 articles
Browse latest View live

LockBit no longer world’s No. 1 ransomware gang

Well-known ransomware gang LockBit has been usurped as the world’s top ransomware gang, according to a recent report from NCC Group. For the past eight months, LockBit has led the world in ransomware...

View Article


Microsoft amps up focus on Windows 11 security to address evolving cyberthreats

Ahead of its Build conference this week, Microsoft announced a series of enhancements to Windows 11 aimed at making it more secure against a more intimidating, varied, and AI-enable threat landscape....

View Article


Tracking manual attacks may deliver zero-day previews

Differentiating between manual and bot attacks, and homing in on human ones in particular, can give security professionals a leg up on combatting fraud attempts versus corporate systems. According to...

View Article

Building an AI strategy for the modern SOC

Artificial intelligence (AI) holds significant promise to increase productivity across business functions, and cybersecurity is no exception. Arguably no area of the security operation is more poised...

View Article

Top cybersecurity M&A deals for 2024

Cybersecurity continues to remain one of the biggest concerns in global information technology in 2024 following a year that saw security incidents continue to grow at an alarming rate. After...

View Article


Emerging ransomware groups on the rise: Who they are, how they operate

The shutdown of BlackCat (ALPHV) in March and the law enforcement disruption of LockBit infrastructure in February have created a void in the ransomware ecosystem that’s quickly being filled by less...

View Article

What is spear phishing? Examples, tactics, and techniques

Spear phishing definition Spear phishing is a direct, targeted email attack aimed at specific individuals that appears to come from a trusted sender. In spear phishing, attackers often use information...

View Article

Windows Recall — a ‘privacy nightmare’?

Windows Recall, the new feature that records a user’s screen at regular intervals, has been labelled a “privacy nightmare” due to potential data privacy and security risks. Microsoft announced the...

View Article


Kroll cyber threat landscape report: AI assists attackers

In its frontline threat intelligence report for the first quarter of 2024, risk and financial advisory firm Kroll revealed that, as in virtually every other industry, cyber criminals are using...

View Article


Chrome patches fourth zero-day flaw this month

Google released a new stable update for its Chrome browser in order to fix an actively exploited vulnerability. This brings the number of zero-day flaws patched this month to four and eight in total...

View Article

The art of saying no is a powerful tool for the CISO in the era of AI

Moving fast can be a good thing but not at the cost of security — as the AI boom puts immense pressure on product teams to quickly bring products to market ahead of competitors, CISOs can seize this...

View Article

How to choose the right network security monitoring product

Network security monitoring products help companies maintain network security by continuously checking for potential security threats and vulnerabilities. They collect, analyze, and respond to network...

View Article

Innovating safely: Navigating the intersection of AI, network, and security

The widespread adoption of artificial intelligence (AI) has thrust it in the limelight, accelerating change across enterprises and industries. Given its potential use as a tool both for and against...

View Article


Third-party software supply chain threats continue to plague CISOs

The latest software library compromise of an obscure but popular file compression algorithm called XZ Utils shows how critical these third-party components can be in keeping enterprises safe and...

View Article

CISSP certification: Requirements, training, exam, and cost

What is CISSP?   Certified Information Systems Security Professional (CISSP) is an advanced certification for IT and cybersecurity professionals that demonstrates their ability to design, implement,...

View Article


Data leak exposes personal data of Indian military and police

More than 1.6 million documents containing sensitive personal data from India’s police, military personnel, teachers, and railway workers were exposed online, according to a report by WebsitePlanet....

View Article

US healthcare agency to invest $50M in threat detection tools that predict...

With healthcare increasingly in attackers’ crosshairs, a US federal agency wants to spend more than $50 million to create a fully automated open-source threat detection tool for healthcare businesses,...

View Article


Cybersecurity at a crossroads: Time to shift to an architectural approach

According to ESG research, 45% of cybersecurity professionals believe that security operations are more difficult today than they were two years ago, while another 11% claim that things are about the...

View Article

Repeated cyberattacks on court systems raise security concerns for the US

Through a statement issued last month, Jackson County, Missouri, confirmed that a ransomware attack was responsible for the disruption of several county services, including the shutting down of the...

View Article

Check Point VPNs exploited to breach enterprise networks

Cybersecurity provider Check Point has advised its VPN customers to patch the Security Gateways service immediately to prevent threat actors from gaining initial access to enterprise networks through...

View Article
Browsing all 1593 articles
Browse latest View live