Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Machine War Has Begun: Cybercriminals Leveraging AI in DDoS Attacks

In the digital landscape, the integration of Artificial Intelligence (AI) into cybercriminal activities has marked the beginning of a new era of threats. The “machine war” has indeed commenced, with AI enhancing the scale and sophistication of cyberattacks. Distributed denial of service (DDoS) attacks, in particular, have become more formidable with AI’s capabilities, presenting significant challenges for cybersecurity defenses.

Microsoft Copilot for Security - Proper Configuration is the Key

Microsoft Copilot for Security is a powerful new artificial intelligence tool that can help companies home in on credible cybersecurity threats amid an onslaught of noise. However, significant expertise is required to configure and operate it properly and avoid unnecessary costs. These are a few key takeaways from the webinar, "Getting Started with Microsoft Copilot for Security", presented by Dan Gravelle, Director of Global Solutions Architecture at Trustwave.

Public Sector Breach Alert: Q3 2024

The public sector has faced a surge of cyber attacks in recent months, targeting state agencies, schools and local governments, severely affecting operations. Several recently released cyber industry reports show a steady or growing number of ransomware attacks so far in 2024. The examples below are just some of the cyber attacks against public sector organizations this past summer.

HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content

HTML smuggling techniques have been around for quite some time. A previous Trustwave SpiderLabs’ blog discussed its use in distributing malware by storing binaries in immutable blob data within JavaScript code that gets decoded on the client-side browser, eventually delivering the payload.

Deep Learning Explained: Structured vs Unstructured Data | Razorthorn Security

Josh Neil explains the concept of deep learning and how it was designed to discover structure in unstructured data, such as images and text. Learn why this technology is key to advancements in cybersecurity. #DeepLearning #StructuredData #CyberSecurity.

Top 7 User Activity Monitoring (UAM) Tools for 2024

Every step you take, every move you make, some company will be watching you. While user activity monitoring may sound invasive at first, the growing number of insider and external threats makes it compulsory for companies to understand how users interact with their systems. 43% of workers report their employer monitors their online activity, and this percentage rises to 48% for hybrid employees.

The 443 Podcast - Episode 307 -How To Deanonymize the TOR Network

This week on the podcast, we discuss how German law enforcement managed to deanonymize and arrest users on the TOR network. After that, we discuss why the US government is trying to ban Chinese-manufactured car hardware. We then end with a cool research article on chaining open redirect and iframe issues into a 1-click vulnerability that grants attackers access to arbitrary Google Docs files. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Why the CISO & CIO Must Partner for Cyber Resilience

In today’s interconnected world, where the digital landscape is constantly evolving, the threats to an organization’s cybersecurity posture are more sophisticated and pervasive than ever before. Relying on traditional, largely prevention-focused cybersecurity tools and approaches is not enough. Cyber attacks are inevitable.