Are Your VM Scans Testing the Entirety of the Network?

Are Your VM Scans Testing the Entirety of the Network?

Many organizations have a vulnerability management (VM) problem without knowing it. Vulnerability management is a crucial component of any organization’s cybersecurity program and is required by most major compliance standards because of its sink-or-swim impact on network security. One of the biggest issues in VM is that organizations aren’t testing the entirety of their networks. Could yours be among them?   We already know vulnerability exploitation is on the rise, with a nearly threefold increase from…

Read More

Data Shows You’ll Encounter A Deepfake Today—Here’s How To Recognize It | McAfee Blog

Data Shows You’ll Encounter A Deepfake Today—Here’s How To Recognize It | McAfee Blog

The internet is brimming with content designed to entertain, inform—and sometimes deceive. The latest tool in a cybercriminal’s arsenal? Deepfakes. From fabricated celebrity endorsements to fraudulent job interviews, AI-generated deepfake scams are growing at an alarming rate. As deepfake technology becomes more advanced, it’s harder than ever to discern real from fake—until it’s too late.  According to McAfee’s latest “State of the Scamiverse” report, deepfake scams have become an everyday reality. The average American now encounters…

Read More

DragonForce Ransomware Hits Saudi Firm, 6TB Data Stolen

DragonForce Ransomware Hits Saudi Firm, 6TB Data Stolen

A new ransomware attack by DragonForce has targeted organizations in Saudi Arabia. The attack, which affected a prominent Riyadh-based real estate and construction firm, resulted in the exfiltration of over 6TB of sensitive data. According to a new advisory by Resecurity, threat actors first announced the breach on February 14, 2025, demanding ransom before publishing the stolen information. The deadline was set for February 27, one day before the start of Ramadan. Advanced Data Leak…

Read More

Winos 4.0 Malware Targets Taiwan With Email Impersonation

Winos 4.0 Malware Targets Taiwan With Email Impersonation

A new malware campaign using Winos 4.0 that targets organizations in Taiwan through email impersonation has been uncovered by cybersecurity experts.  FortiGuard Labs observed the attack in January 2025, noting that the malware, previously distributed via gaming applications, is now being spread through phishing emails disguised as official tax documents. Attack Methodology The phishing emails claim to originate from Taiwan’s National Taxation Bureau, urging recipients to download an attachment containing a list of companies scheduled for…

Read More

Overcoming data compliance and security challenges in the age of AI

Overcoming data compliance and security challenges in the age of AI

We are in the era of artificial intelligence (AI), and businesses are unlocking unprecedented opportunities for growth and efficiency. In IT service and operations (ServiceOps), AI agents are providing assistance for in-context insights, incident response, change risk prediction, and vulnerability management. AI technologies, like large language models (LLMs), require large and diverse datasets to train models, make predictions, and derive insights. However, the diversity and velocity of data utilized by AI pose significant challenges for…

Read More

IDC launches TechMatch to help businesses select software vendors

IDC launches TechMatch to help businesses select software vendors

However, Carter noted, “the way that IDC frames the world is often not how our buyers categorize things. And so we’re learning that we need to maybe have more knowledge — what we call a knowledge graph orientation — towards this, where they can pick and choose different options, and they define their requirements a bit more dynamically, as opposed to falling into our traditional categories as we’ve done as a research house over the…

Read More

Beware of Fake Cybersecurity Audits: Cybercriminals Use Scams to Breach Corporate Systems

Beware of Fake Cybersecurity Audits: Cybercriminals Use Scams to Breach Corporate Systems

Companies are being warned that malicious hackers are using a novel technique to break into businesses – by pretending to offer audits of the company’s cybersecurity. With ransomware and other cybersecurity threats high in the mind of many business owners, it is all too easy to imagine how many companies might react positively to an invitation to have the security of their networks tested. But computer crime fighters in Belgium and Ukraine have warned that…

Read More

Software Vulnerabilities Take Almost Nine Months to Patch

Software Vulnerabilities Take Almost Nine Months to Patch

The average fix time for software security vulnerabilities has risen to eight and a half months, a 47% increase over the past five years, according to Veracode’s latest State of Software Security (SoSS) report. The average fix time is also 327% higher compared to 15 years ago, largely as a result of increased reliance on third-party code and use of AI generated code. Half (50%) of all organizations have critical security debt – defined as…

Read More

TI basada en productos: seis pasos clave para ejecutar el cambio

TI basada en productos: seis pasos clave para ejecutar el cambio

5. Transformar la TI en KPI digitales El número de métricas vinculadas a Agile, DevOps, ITSM, proyectos y productos es abrumador. La transformación digital de las organizaciones de TI y la adopción de disciplinas de gestión de productos deben basarse en datos. Sin embargo, los CIO que dirigen organizaciones que se centran excesivamente en los plazos, la productividad y otras métricas operativas deberían considerar una revisión holística de los indicadores de rendimiento del departamento al…

Read More

Can AI live up to its promise?

Can AI live up to its promise?

This is one of the questions that has been on our minds for some time now every time we read about the latest advances and promises of artificial intelligence (AI). The bombardment of information about the progress of AI is continuous and comes from many fronts with different objectives; either conveying excessive optimism (e.g. superintelligent, conscious AI, etc.) or, on the contrary, drawing dystopian scenarios (e.g. AI that will exterminate humanity). In either case, often…

Read More
1 10 11 12 13 14 2,641