Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Undercover Threat: North Korean Operatives Infiltrate U.S. Companies Through Job Platforms

Researchers at Nisos warn that North Korean threat actors are impersonating skilled job seekers in order to obtain remote employment at US companies. “The identified personas claim to have highly sought-after technical skills and experience and often represent themselves as U.S.-based teleworkers, but Nisos investigators found indications that they are based abroad,” the researchers write.

Phishing Remains the Most Common Attack Technique, With Malicious URL Use Increasing 144%

Analysis of nearly a year’s worth of emails brings insight into exactly what kinds of malicious content are being used, who’s being impersonated, and who’s being targeted. I love data built on statistically relevant data samples, as the larger the data set, the more relevant and representative of an entire industry, country, or world it is. One such report is Hornetsecurity’s just released Cyber Security Report 2024.

What Is Ransomware as a Service?

Ransomware as a Service (RaaS) is a business model in which cybercriminals develop and sell ransomware to buyers known as affiliates who use it to execute ransomware attacks. Ransomware is a type of malware that prevents users from accessing their data or devices by encrypting them and locking users out until a ransom is paid. Typically, cybercriminals need to know some coding to develop and execute ransomware attacks.

Are Your Private Apps Secure? 3 Questions To Ask

Your data has left the premises. While virtual private networks (VPNs) used to be the go-to solution for extending access to private apps to remote users, they aren't a sufficient solution for securing a hybrid workforce. Because they place so much trust in users and devices, they end up granting overly permissive access to everything inside the perimeter, putting your data at risk.

Defending Against ChatGPT-Enhanced Phishing with Managed Detection and Response

Phishing, already a serious, ever-present threat, is getting even more pernicious thanks to ChatGPT, which enables threat actors to craft more realistic emails. Clearly, organizations need a way to fight back that recognizes the depth of the threat, including by employing managed detection and response services.

5 Levels of User Behavior Monitoring and Analytics

Monitoring user behavior is an effective practice for early detection and prevention of insider threats. Identifying suspicious user behavior can help eliminate potential threats, data breaches, and policy violations. Thus, your organization will better meet the requirements of many industry standards such as NIST, HIPAA, PCI DSS, and more. But to get the most out of user behavior monitoring, you need to better understand its principles.

7 Cybersecurity Trends for 2024

As the curtains close for year 2023, the financial impact of cyberattacks on the global economy is predicted to reach $10.5 trillion. It is imperative for IT managers to be aware of the evolving landscape. Let’s see what will shape the cybersecurity arena in the coming year. From a data-centric perspective, we have identified 7 trends that will be important for data security.