Businesses of all types and across all industries are facing increased pressure from customers, vendors and even employees to offer secure and fast wireless access. Although offering Wi-Fi is vital, it remains vulnerable to wireless threats. Networks may unknowingly allow client connections to a malicious access...
Addressing one of the most critical application security risks, Authentication is a cornerstone capability of any application.
Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken...
This report details seven case studies of attacks that were
intercepted and neutralized by cyber defense AI, including
insider threat, ransomware, and IoT attacks.
While all threat scenarios were distinct, some fast-moving
and others slow and stealthy, in all cases the subtle indicators
of suspicious activity...
The myriad of security tools used by businesses today creates
massive quantities of data and surfaces too many alerts for
analysts to effectively manage. As threats become increasingly
sophisticated and the cyber security industry continues
to face a skills shortage, over-worked and under-resourced
As in many other areas plagued by digital complexity, business leaders and security
teams have ultimately turned to artificial intelligence to keep pace.
Download this whitepaper to discover how Darktrace technology offers a solution to the threat landscape of today, and learn about:
Email and collaboration platforms are the connective tissue
of most businesses and organizations, where information
is shared, plans are hatched, and alliances formed. Yet as a
human-driven medium, email often represents the 'weakest
link' in an organization's security strategy. Indeed, 94% of
Microsoft removed 18 apps from its Azure cloud platform that were being used by hackers as part of their command-and-control infrastructure. The threat group, called Gadolinium, was abusing the infrastructure to launch phishing email attacks, Microsoft researchers say.
The U.S. Cybersecurity and Infrastructure Security Agency has issued a report describing how a threat actor apparently used a well-known VPN vulnerability and compromised Office 365 credentials to gain administrative privileges to a federal agency's network.
Microsoft and the Cybersecurity and Infrastructure Security Agency have issued warnings that a critical vulnerability in Windows Server dubbed "Zerologon" is being actively exploited in the wild. They urge users to immediately apply an available partial patch.
Facebook is again cracking down on fake accounts and pages linked to a Russian IRA troll farm or the country's military intelligence units that were being used for disinformation campaigns. Meanwhile, the FBI issued a fresh warning that threat actors are attempting to target U.S. voting infrastructure.
With so many cybercrime markets continuing to disappear, why haven't encrypted messaging apps stepped in to fill the gap? They might seem to be the perfect solution to admins stealing buyers' and sellers' cryptocurrency - via an exit scam - or police infiltration. But encrypted apps have their own downsides.
The U.S. National Institute of Standards and Technology this week released a long-awaited guidance update, Special Publication 800-53 Revision 5, describing "next-generation security and privacy controls" and how to use them.
Australian police say they've broken up a sophisticated SMS phishing scheme designed to collect personal details and bank login credentials. It's a rare success in the fight against unsolicited text messages.
Revisiting remote workforce security defenses, simplifying cloud access controls and pursuing risk-based vulnerability management and passwordless authentication are among the 10 security projects that all organizations should consider for this year and next, according to advisory firm Gartner.
When a crisis manifests, organizations need to respond quickly or risk insolvency. Some crises
require that companies, organizations, and government agencies enable remote workers quickly
and efficiently to ensure operational and business continuity. Such efforts to enable a remote workforce
are challenging for...