Cybersecurity's Broken Model: The Cost of Overcomplication and Underperformance

Cybersecurity's Broken Model: The Cost of Overcomplication and Underperformance

Cybersecurity is in need of a reckoning. Global cybersecurity spend reached a record $79.2 billion in 2023 and is expected to grow by almost 10% this year – a reflection of the evolving, and increasingly nefarious threats in our hyper-digital world. On paper, that’s a good thing. More investment should mean better protection, right? Yes, it should. But, despite the rise in spending, in the first half of 2024 alone there was still a 14% increase in…

Read More

DaggerFly-Linked Linux Malware Targets Network Appliances

DaggerFly-Linked Linux Malware Targets Network Appliances

A new malware strain, ELF/Sshdinjector.A!tr, has been linked to the DaggerFly espionage group and used in the Lunar Peek campaign to target Linux-based network appliances. Its primary function is data exfiltration. How the Malware Works Uncovered by cybersecurity researchers at FortiGuard Labs, the malware operates using multiple binaries that work together to infect a system: Dropper: Checks if the system is already infected; if not, it deploys malicious binaries libsshd.so: A modified SSH library that communicates with a…

Read More

Linux containers in 2025 and beyond

Linux containers in 2025 and beyond

The upcoming years will also bring about an increase in the use of standard container practices, such as the Open Container Initiative (OCI) standard, container registries, signing, testing, and GitOps workflows used for application development to build Linux systems. We’re also likely see a significant rise in the use of bootable containers, which are self-contained images that can boot directly into an operating system or application environment. Cloud platforms are often the primary platform for…

Read More

Sophisticated Phishing Attack Bypasses Microsoft ADFS MFA

Sophisticated Phishing Attack Bypasses Microsoft ADFS MFA

A new phishing campaign has been observed targeting organizations using Microsoft Active Directory Federation Services (ADFS), leveraging spoofed login pages to steal credentials and bypass multi-factor authentication (MFA). According to cybersecurity researchers at Abnormal Security, the attack exploits ADFS, a single sign-on (SSO) solution that allows users to authenticate across multiple applications with a single set of credentials. Threat actors craft highly convincing phishing pages that mirror the legitimate ADFS login portals of targeted organizations,…

Read More

Threefold Increase in Malware Targeting Credential Stores

Threefold Increase in Malware Targeting Credential Stores

Infostealers continued to grow in popularity on the cybercrime underground last year, with credentials from password stores appearing in 29% of malware samples analyzed by Picus Security. The security vendor’s Red Report 2025 examined over one million malware samples and mapped more than 14 million malicious actions and 11 million instances of MITRE ATT&CK techniques, in order to better illuminate the threat landscape. It revealed a three-fold increase in the share of malware strains targeting credential…

Read More

LinkedIn gets its own suite of video tools as it grows video presence on platform

LinkedIn gets its own suite of video tools as it grows video presence on platform

Getty Images / SOPA Images / Contributor The skyrocketing popularity of short-form video has transformed social media. LinkedIn says video on LinkedIn is bring watched 36% more year over year, with video creation growing at twice the rate of other post formats. As a result, the professional networking platform is leaning into video content.   On Tuesday, LinkedIn announced a suite of video tools, including new creator analytics, video feed updates, enhanced video search, and more. …

Read More

One of my favorite Android smartwatches has a 100-hour battery life – and it's on sale

One of my favorite Android smartwatches has a 100-hour battery life – and it's on sale

Matthew Miller/ZDNET What’s the deal? Amazon has discounted the OnePlus Watch 2 by $50, making its new price $250. This makes the wearable one of the best smartwatches in terms of value and accessibility. ZDNET’s key takeaways The OnePlus Watch 2 normally retails for $299 on Amazon. It boasts many attractive features, including elegant hardware, flawless performance, and a long battery life. However, the wearable does lack advanced health functions and is a bit large for…

Read More

The Foundation of Data Security: Why Data Discovery Is the Critical First Step

The Foundation of Data Security: Why Data Discovery Is the Critical First Step

In the complex world of cybersecurity, one fundamental truth remains constant: you can’t protect what you don’t know exists. This is why data discovery stands as the cornerstone of any effective data security strategy. For Chief Information Security Officers (CISOs) and security professionals, understanding the critical importance of comprehensive data discovery can mean the difference between a robust, responsive security posture and a vulnerable one. Data discovery is not just a preliminary step; it’s the…

Read More

Cybersecurity for Businesses of All Sizes: A Blueprint for Protection

Cybersecurity for Businesses of All Sizes: A Blueprint for Protection

One of the primary reasons why cybersecurity remains a complex undertaking is the increased sophistication of modern cyber threats. As the internet and digital technologies continue to advance, so do the methods and tools cybercriminals use. This means that even the most secure systems are vulnerable to attacks over time. Detecting and preventing these attacks require constant vigilance and adaptation. The human element of security only makes this more complex, rendering well-secured systems vulnerable to…

Read More

Reaching My Ultimate Goal: Cisco Live!

Reaching My Ultimate Goal: Cisco Live!

In undergrad at East Carolina University, I stumbled across Cisco Live. Although I was a communications major interested in journalism and mass media, I was familiar with the lucrative opportunities in the Raleigh-Durham area at various tech companies and I wanted to land a great job at one of them someday. Cisco was the second company I researched. The first thing I saw on the homepage was Cisco Live. I was intrigued by the collaboration…

Read More
1 140 141 142 143 144 3,793