Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How To Detect and Remove a Keylogger

You can detect a keylogger if you notice unfamiliar apps on your device, slower performance speeds, a lag in mouse movements or strange background noises on phone calls. A keylogger is a type of malware that requires an entry point, such as an email or cloud program, to be installed on your device. Once it is on your device, a cybercriminal can monitor every keystroke you make to learn your login credentials and private information.

Cost of Cybercrime Estimated 15.6 Trillion in 2029

Statista projects that the total cost of cybercrime will increase from $6.4 trillion between 2024 and 2029, reaching a staggering $15.63 trillion by the end of this period. They reported: "The global indicator 'Estimated Cost of Cybercrime' in the cybersecurity market was forecast to continuously increase between 2024 and 2029 by in total 6.4 trillion U.S. dollars (+69.41 percent). "After the eleventh consecutive increasing year, the indicator is estimated to reach 15.63 trillion U.S.

Top open-source CSPM projects to secure your cloud infrastructure

As more organizations move their critical infrastructure to the cloud, ensuring security has become a top priority. This is where Cloud Security Posture Management (CSPM) comes in. CSPM solutions validate the configuration of cloud services from a security perspective, ensuring alignment with best practices and compliance frameworks such as CIS Benchmarks, PCI-DSS, NIST, and others.

Physical Security In The Age Of Digital: Access Control System Vulnerabilities

Access control systems are the physical form of the layers of data, credential and identity controls underpinning the systems relied on every day. Yet, they can be an afterthought; even the most high-profile breaches of physical security systems can take years to rectify. Security Week highlights the vulnerabilities affecting Nice Linear, a widely used proprietary system in the world of smart homes. Over 2,500 individual vulnerabilities flagged in 2019 alone.

England and Wales Report a Spike in Computer Misuse

The Office for National Statistics (ONS) most recent Crime Survey for England and Wales (CSEW) has revealed that computer misuse cases rose 37% in the year ending March 2024, bucking a general trend of decline. The CSEW first started tracking computer misuse in the year ending (YE) March 2017, which saw roughly 1.8 million incidents. By March 2023, this number had fallen to 745,000. In March 2024, however, computer misuse incidents rose dramatically to 1 million.

Windows Vulnerability Exploited Using Braille 'Spaces' in Zero-Day Attacks

A recently addressed Windows MSHTML spoofing vulnerability, tracked as CVE-2024-43461, has been revealed to have been actively exploited in zero-day attacks by the Advanced Persistent Threat (APT) group, Void Banshee. Initially unmarked as exploited, Microsoft later updated its advisory to confirm that the vulnerability had been abused in attacks prior to its fix.

5 Ways to Prevent Subscription Abuse

The subscription model is a gift that keeps on giving. For customers, it offers convenience, flexibility, and continuous access to the services or products they love. For businesses, it creates a steady and predictable revenue stream, fosters long-term customer relationships, and provides valuable insights into user behavior. But here’s a third player in the game that loves subscriptions just as much: fraudsters.

Corelight Open NDR Achieves VMware Ready for Telco Cloud Infrastructure Certification

Accelerate Your Hybrid Cloud Security with Corelight Open NDR, now in the VMware Marketplace Corelight’s Open NDR platform has achieved VMware Ready for Telco Cloud Infrastructure (TCI) certification and is now active in the VMware Marketplace.