Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

Russia-Based Global Cybersecurity Vendor Group-IB Exits the Russian Market

Amid potential concerns by governments, customers, and prospects about ties with the Russian government, the cybersecurity vendor Group-IB continues in its promise to separate itself from Russia. You can understand how an organization may look at a Russia-based company these days; it’s not the fault of the Russian company, but of the negative posture many feel towards the Russian government.

SEC requires reporting cyberattacks within 4 days, but not everyone may like it.

New rules requiring publicly-listed firms to disclose serious cybersecurity incidents within four days have been adopted by the US Securities and Exchange Commission (SEC). The tough new rules, although undoubtedly well-intentioned, are likely to leave some firms angry that they are being "micromanaged" and - it is argued - could even assist attackers.

What are Backdoor Attacks and How Can You Defend Against Them?

Backdoor attacks are on the rise. In 2022, this relatively little known cyberattack vector overtook ransomware as the top action deployed by cybercriminals. According to the IBM Security X-Force Threat Intelligence Index 2023, nearly a quarter of cyber incidents involved backdoor attacks. But what is a backdoor attack and how can you protect your organization from becoming a victim? Let’s explore this stealthy threat.

Why Is PowerShell So Popular for Attackers?

There is an old saying: “One person’s tool is another person’s weapon.” That is certainly true of Windows PowerShell. Included with every Windows operating system today, this powerful command-line shell and scripting language is used by IT professionals for system administration, remote management, cybersecurity, software development and more.

Understanding Machine Learning Attacks, Techniques, and Defenses

Machine learning (ML) is a subset of Artificial Intelligence (AI), which enables machines and software to automatically learn from historical data to generate accurate output without being programmed to do so. Many leading organizations today have incorporated machine learning into their daily processes for business intelligence. But the ability of machine learning can be altered by threat actors to be malicious, causing systems to malfunction, or to execute an attack.

Retrieval vs. poison - Fighting AI supply chain attacks

While perhaps new to AI researchers, supply chain attacks are nothing new to the world of cybersecurity. For those in the know, it has been best practice to verify the source and authenticity of downloads, package repositories, and containers. But human nature usually wins. As developers, our desire to move quickly to improve ease of use for users and customers can cause us to delay efforts to validate the software supply chain until we are forced to by our peers in compliance or security organizations.

Rising Cybercrime: How Cyber Attackers Utilize Grammarly & Chat GPT

Explore the evolving tactics of cyber attackers, leveraging Grammarly and Chat GPT to craft convincing emails. Dive into social media targeting and psychological manipulation through bribery and coercion. Unravel the complexities of this ever-changing landscape. GUEST BIOS Joe Hancock.

SiegedSec Compromise NATO

As part of their campaign against the West, SiegedSec announced of their successful attack on NATO and leaking some valuable documents. The leak, as the group stated, included hundreds of sensitive documents from NATO’s COI portal, which were meant exclusively for NATO countries and partners. SiegedSec claims that their motive behind the attack is NATO’s alleged infringement on human rights.

Twitter Hack: Joseph O'Connor Jailed for Celebrity Cyber Attack

In 2017, Joseph O'Connor was charged with the crime of using his computer to hack into the Twitter accounts of multiple celebrities. Using a phishing attack, he was able to gain access to sensitive information and post messages without the celebrity's permission. This included posts that contained links to malicious software and webpages containing viruses. He also used his access to send malicious messages in the names of celebrities, as well as posting defamatory content about them.