A previously documented cryptomining worm dubbed Gitpaste-12 has returned with a wide-ranging series of attacks targeting web applications and IoT devices that exploit at least 31 vulnerabilities, according to Juniper Threat Labs.
Implementing the "zero trust" model in a hybrid cloud environment presents challenges, says Rajpreet Kaur, senior principal analyst at Gartner, who recommends a phased approach.
By some estimates, there are more than 3,500 cybersecurity vendors, and the market is growing more crowded, noisy and competitive. How does one be the signal and not the noise? Six Israeli cybersecurity marketing executives share their passionate views.
An updated version of the AgentTesla information-stealing malware now boasts additional data harvesting capabilities, including the ability to target more web browsers and email clients, according to Cofense. The malware has become popular with fraudsters and BEC gangs.
A mighty effort is underway to figure out which organizations may have been deeply infiltrated by a suspected Russian hacking group following the SolarWinds hack. The hunt is difficult for many reasons, some experts say, and may never result in definitive answers about whether data was stolen.
A spear-phishing campaign in which emails appear to originate with legitimate companies is targeting enterprise users to steal Office 365 credentials, according to Abnormal Security.
Several recent ransomware attacks, including those involving Ryuk and Egregor, have used a commodity malware variant called SystemBC as a backdoor, according to Sophos.
The shortage of trained cybersecurity workers has substantially declined this year as many more individuals entered the field, says Clar Rosso, CEO of (ISC)², the U.S.-based nonprofit association that offers training to cybersecurity professionals.
Waterfall, Agile, DevOps... it seems that every few years, a new methodology is born for optimum software creation within an organization. While these processes all have their strengths and weaknesses, the streamlining (and, er, previously absent red tape) they bring can feel like somewhat of a hindrance to the main...
Secure Code Warrior's Director of the Americas, Stephen Allor, hosts a webinar with Russ Wolfe of Capital One, in which they discuss the cybersecurity landscape in the BFSI sector.
They reveal why financial institutions are the new innovators when it comes to rolling out new initiatives, tools and training in the...
It's not just that ransomware attacks are up in 2020; it's that attackers have evolved their tactics and techniques. And Deepen Desai of Zscaler says this means it's time for organizations to completely reimagine their ransomware defenses.
In 2011, Sam Curry headed the response team for RSA's then-landmark breach. Today, as CSO at Cybereason, he looks at the SolarWinds supply chain attack and sees similarities - but also is struck by "the scale, the scope, the subtlety" of the incident.
As we near the end of one year of living with COVID-19, the pandemic is creating new U.S. daily records for infections, hospitalizations and deaths. "The whole country is on fire," says pandemic expert Regina Phelps.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.