News
-
"A Long-Awaited IoT Reverse Engineering Tool Is Finally Here"Ang Cui, an embedded device security researcher, previewed a tool for analyzing firmware at the 2012 DefCon security conference in Las Vegas. Firmware is the foundational software that supports any computer and coordinates between hardware and software.…
-
"This Company Didn't Spot the Flaw in Their Network. But Three Ransomware Gangs Did"According to cybersecurity researchers at Sophos, an unspecified organization fell victim to three different ransomware gangs in a short period of time. The unnamed victim was infected with three types of ransomware, LockBit, Hive, and BlackCat, with…
-
"CISA Releases Toolkit of Free Cybersecurity Resources for Election Community"The Cybersecurity and Infrastructure Security Agency (CISA) recently released its "Protecting U.S. Elections: A CISA Cybersecurity Toolkit." The toolkit is a one-stop catalog of free services and tools available for state and local election officials to…
-
"Cybercriminals Shift From Macros to Shortcut Files to Hack Business PCs, HP Report"Security researchers at HP Wolf Security have discovered that cybercriminals spreading malware are shifting to shortcut (LNK) files to deliver malware. The researchers stated that shortcuts are gradually replacing Office macros (which are starting…
-
"Sysdig Incorporates Machine Learning to Detect Cryptojacking Attempts"One of the most important capabilities a security team can have is the ability to detect and respond to threats in the shortest amount of time possible. The faster they can respond to a data breach, the less disruption and operational impact there will…
-
"US Space Force Conducts Innovative Cyber Talent Acquisition Process"The US Space Force held a Cyber Constructive Service (CCS) Credit Board in May 2022, during which the service solicited applications from civilian cyber professionals to become Space Force cyber officers. A virtual conference attracted approximately 1,…
-
"With Cybersecurity Retention Concerns Rising, How Can You Stay Competitive?"According to a recent survey, most organizations struggle to retain cybersecurity workers. Improving cybersecurity worker retention can help reduce businesses' digital risk. As new cybersecurity concerns emerge, businesses must fight to retain the talent…
-
"Emotet Tops List of July's Most Widely Used Malware"Security researchers at Check Point Research discovered that Emotet was the most widely used malware in the wild in July, followed by Formbook and XMRig. The researchers reported that in 2022 Emotet had a global impact of 14%. July saw a 50%…
-
"Veracode Platform Enhancements Improve Developers’ Ability to Secure Software Supply Chains"Recently at Black Hat USA 2022, Veracode announced the enhancement of its Continuous Software Security Platform with substantial improvements to its integrated developer experience. Some of the new features include extended integrations to support…
-
"Blueprint Builds a 'Common Language' for Ransomware Protection"A new blueprint developed by the Ransomware Task Force aims to provide the small and medium-sized businesses most vulnerable to ransomware attacks with a "common language" that can help leaders understand what must be done to prevent them. The "Blueprint…
-
"Malware, Botnets, and Exploits All Soar in Second Quarter of 2022"According to a new report by the Managed Security Service Providers (MSSP) Nuspire, malware events increased by more than 25 percent, botnets doubled, and exploit activity increased by nearly 150 percent in the second quarter of this year. Based on…
-
"The Business of Hackers-for-Hire Threat Actors"Hackers-for-hire involve secret cyber experts or groups that specialize in infiltrating organizations to gather intelligence. They provide their services to people who are having difficulty breaking into an organization for various reasons, such as a…