Threat

Cybersecurity Strategy: Understanding the Benefits of Continuous Threat Exposure Management

The cybersecurity industry is littered with buzzwords, technologies and acronyms that can often be overwhelming for security professionals doing their best to keep up and ensure their organizations are being adequately protected. Naturally, it’s the leading analyst, research and consulting agencies that security practitioners listen to the most when it comes to making decisions regarding […]

Google to launch threat detection AI powered feature to all Android phones

Google is preparing to introduce a new threat detection feature for its Android 14 and 15 operating systems by the end of this year. This innovative feature aims to enhance device security by preventing unauthorized access in the event of theft or snatching. When the device detects suspicious activity, such as being grabbed and the […]

How Sanctions Can Help in Fighting State-Sponsored Ransomware Actors

In recent years, the threat posed by state-sponsored ransomware actors has become increasingly pronounced, with malicious cyber activities orchestrated by governments or their proxies posing significant risks to global cybersecurity. As these actors continue to exploit vulnerabilities in critical infrastructure and institutions worldwide, there is a growing consensus among cyber-security experts and policymakers that sanctions […]

The Threat That Can’t Be Ignored: CVE-2023-46604 in Apache ActiveMQ

[By Mike Walters, President and co-founder of Action1] In 2023, we witnessed numerous security vulnerabilities making headlines, with a few recent examples being CitrixBleed and libwebp. However, there is another vulnerability that demands immediate attention, despite not receiving the level of recognition it truly deserves in the media.   Apache ActiveMQ vulnerability, known as CVE-2023-46604, […]

The Latest Threat CISOs Cannot Afford to Ignore—Business Payment Fraud

[By Shai Gabay, CEO, Trustmi] As if the list of things keeping CISOs up at night wasn’t long enough, cyberattacks on finance teams and business payment processes are now a priority because they are in the bullseye of bad actors. According to a 2023 webcast poll from Deloitte Center for Controllership™, more than 48 percent […]

The Threat of Data Scraping for Marketing to Cybersecurity

In the digital age, data is often referred to as the “new oil.” Its importance cannot be overstated, especially in the realm of marketing. Marketers are constantly seeking ways to gather data to gain insights into customer behavior, preferences, and trends. One of these methods is data scraping, which, when used unethically or without proper […]

Email inboxes are vulnerable to sophistication driven cyber attacks

In today’s digital world of communication, a vast amount of information is stored and processed through email communication. This includes sensitive data related to financial transactions, healthcare, professional endeavors, and personal conversations with loved ones. Consider this scenario: a malicious hacker gains access to email credentials through phishing techniques and subsequently takes control of the […]

Deepfake: Unveiling the Emerging Cybersecurity Threat

With the rapid advancement of artificial intelligence (AI) technology, a new and concerning cybersecurity threat has emerged: deepfakes. Deepfakes are highly realistic manipulated videos or audio recordings that can convincingly depict individuals saying or doing things they never actually did. This innovative technology poses significant challenges in preserving trust, compromising privacy, and enabling various forms […]

USB Pen Drives posing as a great cyber threat to IT Infrastructure

USB Pen Drives also called as Removable pen drives are posing as a great cyber threat to IT Infrastructure says research carried out by IBM X-Force and another research carried out by Honeywell Cybersecurity claims that 52% of cyber attacks are targeted at the removable media. In both cases, removable media or USB drives is […]

THREAT HUNTING: IS YOUR SECURITY OPERATION READY TO LAUNCH SUCH A PROGRAM?

This post was originally published by (ISC)² Management. It could be a blended attack as slick as a multichannel marketing campaign. Or a spontaneous crime of opportunity by a single dis-gruntled employee. It could even be an innocent configuration error. When a threat exists, there will be indicators. The perennial challenge is to hunt for […]

Share this page