AI weaponization, zero days, 'we the people' attacks - these are among the threats projected for 2024 in Fortinet's FortiGuard Labs’ 2024 Threat Predictions. Derek Manky shares insight and analysis on what to expect to defend against in the New Year.
In Elastic Security Labs' inaugural threat report, explore threat phenomena and trends, gleaning recommendations to help you prepare for the future of cybersecurity. Learn about the latest malware research, attack patterns, and clusters of malicious activity from a team of seasoned threat researchers working with a...
It's critical for healthcare sector entities considering - or already using - generative AI applications to create an extensive threat modeling infrastructure and understand all attack vectors, said Mervyn Chapman, principal consultant at consulting and managed services firm Ahead.
As the threat landscape continues to evolve, defenders need to shift their focus from individual wins to sustained proactive defenses. Resecurity COO Shawn Loveland proposes embracing a strategy of understanding and fighting adversaries in a constantly changing space - with no beginning and no end.
Ransomware incidents are down, but the volume and impact of targeted attacks are on the rise. These are among the findings of the new Global Threat Landscape Report from Fortinet's FortiGuard Labs. Fortinet's Derek Manky shares analysis of this report and insights on the cybersecurity trends that will influence how we...
The ever-expanding threat landscape and the continued talent shortage mean defenders increasingly need to be ready with the skilled talent to face the onslaught of cybercriminals, who are gaining momentum by employing new tactics, according to Pamela Nigro, ISACA board chair.
Many longtime employees have retired,...
Cybercriminals are becoming increasingly innovative and shifting toward more targeted and destructive attacks, using wiper malware, which was previously only used by APT-focused, nation-state actors. Also, ransom payment demands are reaching seven to eight figures.
Rising worries about the digital security of nongovernmental organizations in the Asia-Pacific region haven't translated into robust adoption of basic measures, shows data from a survey of more than 1,500 regional NGOs. NGOs attract hackers for motives including espionage, opposition and data theft.
The CrowdStrike 2023 Global Threat Report, a highly anticipated annual intelligence report for the global security community, examines the relentlessness of today’s adversaries and the persistence required to stay a step ahead of them. Based on frontline observations from CrowdStrike’s elite threat intelligence...
President and CEO Sudhakar Ramakrishna says SolarWinds has done massive work implementing security into the build process since the company was hacked in late 2020. Testing, validating and qualifying the integrity of the company's source code has required significant effort, Ramakrishna tells ISMG.
In 2022, 56% of lower education organizations and 64% of higher education organizations were hit by ransomware in the last year.
This is a considerable increase from the 44% of education respondents that reported an attack in our 2021 survey (based on 499 respondents across lower and higher education).
Download...
As cybercriminals evolve their attack techniques, they pose greater risks to the government, businesses and individuals. It’s more critical than ever to improve your security strategy and proactively prepare for the next wave of cyberthreats.
The first step is to understand the latest attack trends and major...
A recent Deloitte digital transformation report found that organizations with higher digital transformation maturity ratings reported 45% revenue growth. Blurry digital boundries is the main reason more companies aren't digitalizing. The ambiguity supplies many opportunities for accidental data leaks and...
A host of emerging technologies - including artificial intelligence, 5G cellular, quantum computing, nanomedicine and smart hospitals - offer the potential to revolutionize healthcare, but organizations must carefully evaluate the security risks, federal authorities warn.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.