Fighting The International Cyber War with Ai
As Ukraine fights to maintain a stronghold on its besieged capital, cyberattacks are escalating. Governments on both sides of the Atlantic are concerned about a potential full-on cyberwar. By Jarred…
4 Ways to Improve Azure Active Directory Security
Why identity has emerged as the security perimeter in hybrid deployments By Guido Grillenmeier, Chief Technologist at Semperis Cloud-led innovation has accelerated the digital transformation of many organizations that have…
Redefining Resilience in The New World of Work
By Andrew Lawton, CEO of Reskube Ltd We are entering a new world of work. The Covid-19 pandemic has accelerated the move towards hybrid and remote working which was already…
5 Ways Cybersecurity Will Change In 2022
By Jaime Coreano, Vice President of Sales – Flexxon The annual cost of cybercrime is set to hit $10.5 trillion by 2025. The losses caused by theft, fraud and embezzlement…
Looking Ahead: Five Security Trends For 2022
A look at some of the key security trends for next year By Mark Guntrip, Strategy Leader at Menlo Security. Ransomware and the fight back Ransomware has dominated the…
USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence
US Cyber Command (USCYBERCOM) has officially linked the Iran-linked MuddyWater APT group to Iran’s Ministry of Intelligence and Security (MOIS). USCYBERCOM has officially linked the Iran-linked MuddyWater APT group (aka SeedWorm and TEMP.Zagros)…
AbstractEmu, a new Android malware with rooting capabilities
AbstractEmu is a new Android malware that can root infected devices to take complete control and evade detection with different tricks. Security researchers at the Lookout Threat Labs have discovered a new Android malware,…
New CIOs: 5 Key Steps in Your First 100 Days
Getting the first 100 days right is critical to achieving momentum, credibility, and long-term success. By Etay Maor, Senior Director, Security Strategy, Cato Networks Starting off as a new CIO…
Why A ‘Layers and Lists’ Approach to Cybersecurity Is Doomed to Fail
By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a barrage of attacks on a single target and keep going until they find…
Naikon APT group uses new Nebulae backdoor in attacks aimed at military orgs
China-linked APT Naikon employed a new backdoor in multiple cyber-espionage operations targeting military organizations from Southeast Asia in the last 2 years. The Naikon APT group is a China-linked cyber espionage group that has…
XCSSET malware now targets macOS 11 and M1-based Macs
XCSSET, a Mac malware targeting Xcode developers, was now re-engineered and employed in a campaign aimed at Apple’s new M1 chips. Experts from Trend Micro have uncovered a Mac malware…
New Cring ransomware deployed targeting unpatched Fortinet VPN devices
Attackers are actively exploiting the CVE-2018-13379 flaw in Fortinet VPN to deploy the Cring ransomware to organizations in the industrial sector. Threat actors are actively exploiting the CVE-2018-13379 vulnerability in Fortinet…