Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Top Four Security Tips for Cyber Safety on National Computer Security Day

To celebrate National Computer Security Day, which is recognized on November 30 every year, KnowBe4 encourages all IT and security professionals to train their workforce how to stay safe from cybersecurity threats as the organization’s last line of defense. It is also crucial to focus on building a strong security culture by educating employees about today’s cyber threat landscape and how they can play a role in protecting the organization.

Criminals Are Cautious About Adopting Malicious Generative AI Tools

Researchers at Sophos have found that the criminal market for malicious generative AI tools is still disorganized and contentious. While there are obvious ways to abuse generative AI, such as crafting phishing emails or writing malware, criminal versions of these tools are still unreliable. The researchers found numerous malicious generative AI tools on the market, including WormGPT, FraudGPT, XXXGPT, Evil-GPT, WolfGPT, BlackHatGPT, DarkGPT, HackBot, PentesterGPT, PrivateGPT.

Introducing page collections

In January of this year, we introduced the ability to build apps with Tines. That launch marked an evolution of our pages feature, from forms into a powerful capability for collaboration and communication. Since then, we iterated quickly with features like self-submitting pages, multiple buttons, wider pages, advanced formatting options, and saved themes. One request we received time and time again was pages within pages. Our users wanted to surface a collection of pages from a single reference point.

Rubrik Expands SaaS Data Protection to Atlassian Jira Cloud: Now Available

With Atlassian ending support in February 2024 for Jira Software Server – an on-premises deployment of Jira Software - what’s your plan for data protection if you choose to migrate to the cloud? While Atlassian has plenty of tools in place out of the box to protect your data, there’s always more you can do to help prevent data loss.

Squash Scattered Spider Attacks with Forward Networks' Blast Radius

I hate spiders, a lot. But I really hate the idea of a Scattered Spider Attack which can jump between environments that you may have believed were segmented at an alarming rate. That is the stuff of real nightmares for networking and security professionals. Keeping up with your security posture isn’t easy. We’re all doing our best, but is it good enough? One CISO we talked to hired a consulting firm to map out their security posture.

12 Christmas Scams to Watch Out for This Holiday Season

On the twelfth day of Christmas, my true love gave to me... hopefully something better than a virus (computer or otherwise). As the end of the year is fast approaching, it has not been without its fair share of data breaches, hacks, and even the return of digital piracy. As we enter December and fast approaching the most wonderful time of the year, hackers, cybercriminals, and online fraudsters are looking to end the year with a bang.

CyberLink Breached Through Supply Chain Attack By North Korean Hackers

Recently, the Microsoft Threat Intelligence Team has discovered a supply chain attack executed by North Korean attackers. The prime victim of this attack was CyberLink, a multimedia software company headquartered in Taiwan. This strategic infiltration in the CyberLink infrastructure impacted globally present customers, risking data integrity and confidentiality.