Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Ransomware: Attackers resort to old-school techniques and minimal investment

The modus operandi of cybercriminals is constantly changing. It comes as no surprise that, every so often, hackers switch up their methods to become more evasive. However, contrary to what we might imagine, these changes don’t always have to be innovative, or involve new attack strategies. Cybercriminals are increasingly opting to employ old-school techniques, and couple this with minimal investment.

Abusing BOINC: FakeUpdates Campaign Bundling Malware with Legitimate Software

Beginning in early July 2024, Arctic Wolf responded to multiple SocGholish/FakeUpdate intrusions that resulted in a seemingly benign payload being delivered as a second-stage download. The zip file payload contained software from the Berkeley Open Infrastructure for Network Computing (BOINC) project, open-source software that allows users to contribute computing power to scientific research projects focused on solving complex calculations.

Phishing Campaigns Abuse Cloud Platforms to Target Latin America

Several threat actors are abusing legitimate cloud services to launch phishing attacks against users in Latin America, according to Google’s latest Threat Horizons Report. One threat actor, tracked as “PINEAPPLE,” impersonated Brazil’s revenue service, Receita Federal do Brasil, to deliver the Astaroth infostealer.

Creating an Incident Response Process

In today’s cyber threat landscape, almost everyone is one bad day away from a security incident. While not every incident becomes a data breach, security teams need to be prepared for anything. Just like that one friend who has a spreadsheet to help them organize the minute tasks associated with a project, security teams need to have a prepared list of steps to take during an incident.

From Legacy Systems to IoT: Protecting Critical Infrastructure Against Evolving Threats

The explosive growth in connectivity and the geopolitical environment is putting critical infrastructure around the world at risk. Connecting legacy industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that critical infrastructure runs on to IT environments, Internet of Things (IoT) devices, and out to the Internet makes it easier for cybercriminals and state-sponsored groups to gain access to systems and conduct malicious activities.

EP 57 - Proactive Defense: Security's AI Infusion

In this episode of the Trust Issues podcast, we explore the transformative impact of artificial intelligence (AI) on identity security. Guest Peretz Regev, CyberArk’s Chief Product Officer, joins host David Puner, for a discussion about how AI is reshaping cyber protection, offering solutions that are as intelligent as they are intuitive. With the ability to predict threats and adapt with unprecedented agility, AI is ushering in a new era of proactive security.

Compute Environments in AWS Batch: How to Set Up

When you need to run training models and complex analysis with batch jobs at scale, AWS batching can be a good solution. AWS provides a special service to perform a large number of computing operations effectively and without management overhead. This blog post covers the AWS Batch architecture and configuration principles for batch processing.

Network Digital Twin Technology identified as Transformational in Hype Cycle for Enterprise Networking, 2024

It seems as if there is a new networking technology announced every day. When faced with a deluge of information and vendors seeking your attention, it’s easy to get overwhelmed. We feel the Gartner Hype Cycle reports seek to tame the confusion by objectively reviewing new technologies and applications and offering IT leaders a view of how new additions to the market will evolve over time.

Olympic Games Special: How to protect cybersecurity of sports organizations

Millions of spectators from around the world will flock to Paris this summer to attend the 2024 Olympic Games. The UEFA European Football Championship and the America's Cup are also taking place this summer, giving us weeks of massive sporting events on both sides of the Atlantic.

Sky-High Stakes: Combating Cyber Fraud in the Aviation Industry

Fraudulent cyber attacks targeting the airline industry are a common issue largely seen coming out of the underground, such as the deep and dark web. According to RSA Security, airlines are the industry most affected by online fraud, accounting for 46% of fraudulent transactions. As a result, the financial costs for airlines are huge with losses due to fraud estimated at 1.2% of the total global airline revenue.