Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Is your SIEM ready for the AI era? Essential insights and preparations

A head-spinning series of acquisitions and mergers is transforming the security information and event management (SIEM) market. Behind this market shakeup is the ongoing technological shift from traditional, manually intensive SIEM solutions to AI-driven security analytics. Legacy systems — characterized by manual processes for log management, investigation, and response — no longer effectively address today’s fast-evolving cyber threats.

Threat Actors Increasingly Exploit Deepfakes for Social Engineering

The availability of deepfake technology has given threat actors a valuable tool for social engineering attacks, according to researchers at BlackBerry. “Typically, online scams prey on the presumed weaknesses and susceptibility of the targeted individual,” the researchers write.

Phishing and Ransomware: How Threat Actors Attack the Financial Services Sector

Trustwave SpiderLabs is prepped to launch its newest threat intelligence research, the 2024 Trustwave Risk Radar Report: Financial Services Sector. The upcoming report, which is set to be released on September 10, promises to be an indispensable resource for cybersecurity professionals. This comprehensive report not only sheds light on the modus operandi of a dominant ransomware gang but also delves into the persistent use of phishing and brute-force attacks to compromise credentials.

The Ban That Wasn't: What Happened to the FTC's Non-Compete Ban?

Today was supposed to mark a significant shift in employment law in the US: the Federal Trade Commission’s (FTC) ban on non-compete clauses was set to go into effect. However, this anticipated change was blocked by a US District Court in Texas, leaving many wondering about the implications for small and medium-sized enterprises (SMEs) and the IT professionals they employ.

Employee Cybersecurity Awareness Training Strategies for AI-Enhanced Attacks

With the adoption of AI in almost every sphere of our lives and its unending advancement, cyberattacks are rapidly increasing. Threat actors with malicious intent use AI tools to create phishing emails and other AI-generated content to bypass traditional security measures. On the bright side, the security capabilities of AI are limitless. AI-enhanced attacks refer to cybersecurity events that use artificial intelligence to compromise individuals' and organizations' safety.

Cybersecurity in a Cycle: Balancing Repair and Replacement for Optimal Security

Regularly updating your policies, software, and systems is crucial to your long-term cybersecurity efforts. However, failing to properly plan these updates can undermine your continuity plans and impede your business's productivity and profitability. As a cybersecurity specialist, you can balance repairs and replacements by creating a dynamic, adaptive strategy that accounts for industry trends and responds to emerging threats without causing unnecessary expenses to the company.

How SASE and the Internet Took Over Wide Area Networks (Part 2)

This blog is part of the ongoing “I&O Perspectives” series, which features insights from industry experts about the impact of current threats, networking, and other cybersecurity trends. In the first part of this blog series, we observed the inception of an internet-based model where corporate networks have no borders anymore, home is the office, applications are in the cloud. This paradigm shift makes connectivity ubiquitous. But security risks have dramatically increased.