Identity Matching: What You Need to Know About It
When asked how they can improve a bank’s security from financial crime, many bankers are at a loss for words. Granted, the question is a broad one and difficult to…
The Future of Cybersecurity? Just One Word: Automation
By Dr. Peter Stephenson If you are not better informed, smarter, better equipped, and faster than the adversary, you can count on your system being compromised at some point. When…
Taking Back Control of Today’s Software Supply Chain
By Jasmine Noel, Senior Product Marketing Manager, ReversingLabs Supply chains are under attack. Malicious actors perpetrating these breaches will continue to succeed until security teams abandon common myths and misconceptions…
No, You Don’t Need
By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution — extended detection and response (XDR) platforms — are increasingly popular. To…
LockBit 2.0, the first ransomware that uses group policies to encrypt Windows domains
A new variant of the LockBit 2.0 ransomware is now able to encrypt Windows domains by using Active Directory group policies. Researchers from MalwareHunterTeam and BleepingComputer, along with the malware expert Vitali Kremez…
Boosting Morale During Tough Times Will Also Boost Your Security Resilience
By Nir Polak, CEO, Exabeam While 2020 impacted nearly every business, the pandemic was not the only obstacle leaders faced last year. As we begin 2021, it’s important to remember…
US DoJ indicts four members of China-linked APT40 cyberespionage group
US DoJ indicted four members of the China-linked cyberespionage group known as APT40 for hacking various entities between 2011 and 2018. The U.S. Justice Department (DoJ) indicted four members of…
No, You Don’t Need EDR
By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution — extended detection and response (XDR) platforms — are increasingly popular. To…
New enhanced Joker Malware samples appear in the threat landscape
The Joker mobile trojan is back, experts spotted multiple malicious apps on the official Google Play store that were able to evade scanners. Experts reported an uptick in malicious Android…
The Internet of Things Ongoing Directions
By Milica D. Djekic It takes time to get through the journey. Several decades back the global technological landscape has been less developed and different than it is today. In…
BIOPASS malware abuses OBS Studio to spy on victims
Researchers spotted a new malware, dubbed BIOPASS, that sniffs victim’s screen by abusing the framework of Open Broadcaster Software (OBS) Studio. Researchers from Trend Micro spotted a new malware, dubbed BIOPASS, that…
The Mobile Attack Pyramid
Identifying Attack Surfaces is Key to Protecting Mobile Applications By David Stewart, CEO, Approov, Inc. A regular pyramid has 5 surfaces, 4 sloping ones and another as its base. In…