LockBit no longer world’s No. 1 ransomware gang
Well-known ransomware gang LockBit has been usurped as the world’s top ransomware gang, according to a recent report from NCC Group. For the past eight months, LockBit has led the world in ransomware...
View ArticleMicrosoft amps up focus on Windows 11 security to address evolving cyberthreats
Ahead of its Build conference this week, Microsoft announced a series of enhancements to Windows 11 aimed at making it more secure against a more intimidating, varied, and AI-enable threat landscape....
View ArticleTracking manual attacks may deliver zero-day previews
Differentiating between manual and bot attacks, and homing in on human ones in particular, can give security professionals a leg up on combatting fraud attempts versus corporate systems. According to...
View ArticleBuilding an AI strategy for the modern SOC
Artificial intelligence (AI) holds significant promise to increase productivity across business functions, and cybersecurity is no exception. Arguably no area of the security operation is more poised...
View ArticleTop cybersecurity M&A deals for 2024
Cybersecurity continues to remain one of the biggest concerns in global information technology in 2024 following a year that saw security incidents continue to grow at an alarming rate. After...
View ArticleEmerging ransomware groups on the rise: Who they are, how they operate
The shutdown of BlackCat (ALPHV) in March and the law enforcement disruption of LockBit infrastructure in February have created a void in the ransomware ecosystem that’s quickly being filled by less...
View ArticleWhat is spear phishing? Examples, tactics, and techniques
Spear phishing definition Spear phishing is a direct, targeted email attack aimed at specific individuals that appears to come from a trusted sender. In spear phishing, attackers often use information...
View ArticleWindows Recall — a ‘privacy nightmare’?
Windows Recall, the new feature that records a user’s screen at regular intervals, has been labelled a “privacy nightmare” due to potential data privacy and security risks. Microsoft announced the...
View ArticleKroll cyber threat landscape report: AI assists attackers
In its frontline threat intelligence report for the first quarter of 2024, risk and financial advisory firm Kroll revealed that, as in virtually every other industry, cyber criminals are using...
View ArticleChrome patches fourth zero-day flaw this month
Google released a new stable update for its Chrome browser in order to fix an actively exploited vulnerability. This brings the number of zero-day flaws patched this month to four and eight in total...
View ArticleThe art of saying no is a powerful tool for the CISO in the era of AI
Moving fast can be a good thing but not at the cost of security — as the AI boom puts immense pressure on product teams to quickly bring products to market ahead of competitors, CISOs can seize this...
View ArticleHow to choose the right network security monitoring product
Network security monitoring products help companies maintain network security by continuously checking for potential security threats and vulnerabilities. They collect, analyze, and respond to network...
View ArticleInnovating safely: Navigating the intersection of AI, network, and security
The widespread adoption of artificial intelligence (AI) has thrust it in the limelight, accelerating change across enterprises and industries. Given its potential use as a tool both for and against...
View ArticleThird-party software supply chain threats continue to plague CISOs
The latest software library compromise of an obscure but popular file compression algorithm called XZ Utils shows how critical these third-party components can be in keeping enterprises safe and...
View ArticleCISSP certification: Requirements, training, exam, and cost
What is CISSP? Certified Information Systems Security Professional (CISSP) is an advanced certification for IT and cybersecurity professionals that demonstrates their ability to design, implement,...
View ArticleData leak exposes personal data of Indian military and police
More than 1.6 million documents containing sensitive personal data from India’s police, military personnel, teachers, and railway workers were exposed online, according to a report by WebsitePlanet....
View ArticleUS healthcare agency to invest $50M in threat detection tools that predict...
With healthcare increasingly in attackers’ crosshairs, a US federal agency wants to spend more than $50 million to create a fully automated open-source threat detection tool for healthcare businesses,...
View ArticleCybersecurity at a crossroads: Time to shift to an architectural approach
According to ESG research, 45% of cybersecurity professionals believe that security operations are more difficult today than they were two years ago, while another 11% claim that things are about the...
View ArticleRepeated cyberattacks on court systems raise security concerns for the US
Through a statement issued last month, Jackson County, Missouri, confirmed that a ransomware attack was responsible for the disruption of several county services, including the shutting down of the...
View ArticleCheck Point VPNs exploited to breach enterprise networks
Cybersecurity provider Check Point has advised its VPN customers to patch the Security Gateways service immediately to prevent threat actors from gaining initial access to enterprise networks through...
View Article