News
-
"GDPR Compliance Is Not Cybersecurity, Says Analyst"General Data Protection Regulation (GDPR) fines are forcing businesses to reconsider their cybersecurity strategies. However, experts are concerned that, despite compliance looking good on paper, it does not translate into better protection in…
-
"NIST Drafts Major Update to Its Widely Used Cybersecurity Framework"Since its initial publication nearly a decade ago, the world's leading cybersecurity guidance is undergoing its first major update. The National Institute of Standards and Technology (NIST) has released a draft version of the Cybersecurity Framework (CSF…
-
"Identity-Based Attacks Soared in Past Year: Report"CrowdStrike recently released its 2023 Threat Hunting Report, warning that threat actors have doubled down on identity-based attacks over the past year. The new report is based on data collected over 12 months between July 1, 2022, and June 30,…
-
"Over 200 Million Brits Have Data Compromised in Four Years"According to security researchers at Imperva, UK organizations lost billions in data breaches between 2019 and 2022, with hundreds of millions of their customers suffering compromise of their personal information. The researchers studied 99,490…
-
"Protecting Your Self-Driving Car - And Your Privacy - From Cyberhackers in the Age of AI"As cars become increasingly equipped with computerized components, they become more vulnerable to cyberattacks and privacy leaks. Ethical hackers, also known as white hat hackers, have already demonstrated attacks on computerized car technology. The…
-
"LOLBAS in the Wild: 11 Living-Off-The-Land Binaries That Could Be Used for Malicious Purposes"Researchers have found 11 living-off-the-land binaries and scripts (LOLBAS) that threat actors could exploit to conduct post-exploitation activities. Nir Chako, a security researcher at Pentera, describes LOLBAS as an attack technique involving using…
-
"Hackers Increasingly Abuse Cloudflare Tunnels for Stealthy Connections"There has been a rise in the abuse of the legitimate Cloudflare Tunnels feature by hackers to establish stealthy HTTPS connections from compromised devices, circumvent firewalls, and maintain long-term persistence. In January 2023, Phylum reported that…
-
"Managing Human Cyber Risks Matters Now More Than Ever"As Artificial Intelligence (AI) increases the sophistication and scope of phishing, vishing, and smishing attacks, understanding and managing human cyber risks have become increasingly important, according to a report by the SANS Institute. The report…
-
"Mallox Ransomware Group Revamps Malware Variants, Evasion Tactics"The Mallox ransomware group is intensifying its targeted attacks on organizations with vulnerable SQL servers. It has recently emerged with a new variant and various additional malware tools to achieve persistence and circumvent detection. In June 2021,…
-
"How an 8-Character Password Could Be Cracked in Just a Few Minutes"Security experts continue to encourage using strong and complex passwords to protect online accounts and data from cybercriminals. "Complex" passwords typically require lowercase and uppercase letters, numbers, and special symbols. However, according to…
-
"Smart Devices: Putting a Premium on Peace of Mind"At least one smart device vulnerable to cyberattacks, such as smart TVs, robot vacuums, and more, is present in two out of every five homes worldwide. Such devices will soon come with a label that helps consumers determine whether the device is secure…
-
"Hackers Exploit Vulnerability to Target Johns Hopkins"Baltimore-based Johns Hopkins University and Health System are notifying patients that some of their protected health information may have been compromised due to hackers targeting a software vulnerability in MOVEit Transfer. According to a breach…