Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

10 Common Types of Digital Risks

Organizations across all industries are becoming more reliant on digital technology to get the job done. In this era of digital transformation, technologies such as the Internet of Things (IoT), social media, Machine Learning (ML), big data analytics, Artificial Intelligence (AI), and Augmented Reality (AR) exist to help organizations realize their strategic business objectives.

The Hard Evidence That Phishing Training and Testing Really Works

Security awareness training (SAT) and simulated phishing works to significantly reduce cybersecurity risk. We have the data, customer testimonials and government recommendations to prove it. Social engineering, especially as enabled by email, text messages, the web and phone calls, is involved in the vast majority of cybersecurity attacks. No other root initial access hacking method comes close.

Over a third of fraud attempts targeting financial institutions now use AI

One in fifteen fraud attempts now use deepfakes to attack not just B2C firms but increasingly also B2B ones. Fraud prevention decision-makers agree that AI will drive almost all identity fraud in the future, and more people will fall victim than ever before.

CrowdStrike and Cloudflare announce expanded strategic partnership to secure networks and power the AI-native SOC

New alliance combines best-of-breed platforms, accelerating partners' ability to drive vendor consolidation by securing the network and stopping breaches across device endpoints, cloud, identity, data, and applications.

Centripetal Expands Portfolio with CleanINTERNET® DNS, Powered by The Most Extensive Collection of Threat Intelligence in the Industry

Centripetal announceS that it is expanding its offering to include CleanINTERNET® DNS to preemptively safeguard businesses against web-based cyber threats. Unlike other DNS filtering products that rely solely on blocklists, CleanINTERNET® DNS is the first-ever solution to leverage advanced threat intelligence from multiple providers to proactively prevent users from accessing malicious websites and harmful content.
Sponsored Post

EventSentry 5.1.1.104: Security, Security, Security!

Everybody wants to have a more secure network – and everybody has various tools at their disposal to at least improve the security of their network. But which tool is the best for the job, and where do you start? The answer to this question is somewhat easier (and more structured) for organizations that have to adhere to compliance frameworks (ISO, CMMC, PCI, SOC, …), but a little harder for business that have no such requirements.

Top tips: Three telltale signs that you have been cryptojacked

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re looking at three signs that your device may be infected with crypto malware. Has your computer been acting strange lately? Has the performance tanked out of nowhere, and are you experiencing overheating issues even though you’re not running any particularly demanding tasks at the moment?

ChatGPT: A Tool for Attackers and Defenders

ChatGPT impresses everyone with its writing capabilities; however, its proficiency in understanding and generating human-like text has inadvertently empowered threat actors to produce realistic and error-free phishing emails, which can be challenging to detect. The use of ChatGPT in cyberattacks poses a significant threat, particularly for attackers whose first language isn’t English. This tool helps them overcome language barriers, enabling the creation of more convincing phishing content.

Rise of AI in Email Threats: What 2024's Actors are Deploying

The Evolution of Email Threats Email has long been a favored vector for cyber attacks. From the early days of simple phishing scams to the more advanced spear-phishing campaigns, email threats have consistently evolved. However, the integration of AI has brought about a paradigm shift in both the complexity and frequency of these attacks. AI-Powered Phishing Phishing attacks have traditionally relied on mass-distribution strategies, hoping to catch a small percentage of victims.

Escape SIEM LockIn Unleash a Multi-SIEM Strategy with Hyperautomation

If you are a cybersecurity professional, it’s hard to ignore the recent shift in the SIEM landscape unless you’ve been living under a rock… or more likely, under the crushing weight of terabytes worth of disconnected SIEM logs. Let’s catch everyone up to speed anyway.