Tenable Strengthens Its Identity Exposure Capabilities to Protect Against Compromises

Tenable Strengthens Its Identity Exposure Capabilities to Protect Against Compromises

Tenable®, the exposure management company, today announced the launch of Identity 360 and Exposure Center, two new Tenable Identity Exposure capabilities designed to help organizations pinpoint identity risks and take swift, targeted action to prevent identity-based attacks.  Identity management has become fragmented, leading to identity sprawl – a tangled web of accounts, permissions and misconfigurations across disparate platforms. This fragmentation severely limits visibility and risk detection, weakens access controls, and increases the threat of privilege…

Read More

BlackLock On Track to Be 2025’s Most Prolific Ransomware Group

BlackLock On Track to Be 2025’s Most Prolific Ransomware Group

Security researchers have lifted the lid on one of the fastest growing and formidable ransomware-as-a-service (RaaS) groups of 2025. Dubbed “BlackLock” (aka El Dorado or Eldorado), the RaaS outfit has been around since March 2024 and has increased its number of data leak posts by a staggering 1425% quarter-on-quarter in Q4 of last year, according to ReliaQuest. The threat intelligence vendor claimed that BlackLock could become the most active RaaS group of 2025. Although, like many…

Read More

Prioritizing AI investments: Balancing short-term gains with long-term vision

Prioritizing AI investments: Balancing short-term gains with long-term vision

In parallel, building the organizational constructs around data quality also requires addressing data governance in parallel and supporting roles for data custodians, stewards and a centralized or federated data governance model to support credible and consistent enterprise data catalogs and products. With an enterprise data platform in place that supports a business-ready zone for consumption as well as appropriate governance, a critical machine learning readiness step is also in place. This can address data anomalies,…

Read More

Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer

Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer

The days when Apple devices were thought to be immune to malware are over, as new malicious campaigns are now targeting macOS. In a new February 18 report, Proofpoint uncovered a brand-new infostealer targeting macOS, FrigidStealer. This malware is deployed in campaigns involving TA569, a prolific threat actor primarily known for its deployment of website injections leading to a JavaScript payload known as FakeUpdates/SocGholish. Proofpoint also revealed two new groups linked to TA569, TA2726 and…

Read More

Ransomware: The $270 Billion Beast Shaping Cybersecurity—Insights from Cyentia's Latest Report

Ransomware: The 0 Billion Beast Shaping Cybersecurity—Insights from Cyentia's Latest Report

Ransomware has evolved into one of the most devastating cyber threats of modern times, creating previously unimaginable financial and operational hardships for entities in every sector. As malicious actors employ increasingly sophisticated tools, honing their tactics and spreading their tentacles, understanding the key trends, targeted industries, and financial impact is at the heart of successfully mitigating risks. With this in mind, the Cyentia Institute, a data-driven cybersecurity research company, has released its Information Risk Insights…

Read More

Got a Microsoft Teams invite? Storm-2372 Gang Exploit Device Codes in Global Phishing Attacks

Got a Microsoft Teams invite? Storm-2372 Gang Exploit Device Codes in Global Phishing Attacks

Security experts have warned that a cybercriminal group has been running a malicious and inventive phishing campaign since August 2024 to break into organizations across Europe, North America, Africa, and the Middle East. The Russian group, known as Storm-2372, has targeted government and non-governmental organisations (NGOs), as well as firms working in IT, defence, telecoms, health, and the energy sector. What makes the campaign particularly notable is the way that it attempts to lure unsuspecting…

Read More

Monitoring Applications vs. Operating Systems: Why It Matters

Monitoring Applications vs. Operating Systems: Why It Matters

In today’s dynamic IT environments, securing and maintaining the integrity of your systems is critical. Fortra’s Tripwire Enterprise is a robust tool designed to help organizations ensure compliance and security by continuously monitoring the configuration and behavior of their IT assets. When deploying Tripwire, a common question arises: should you prioritize monitoring applications, operating systems, or both? In order to help you answer this question, I will unpack the distinctions between monitoring applications and operating…

Read More

New Mac Malware Poses as Browser Updates

New Mac Malware Poses as Browser Updates

A new macOS malware called FrigidStealer is spreading through fake browser update alerts, allowing attackers to steal sensitive data, according to research from Proofpoint. This sophisticated campaign, embedded in legitimate sites, tricks users into bypassing macOS security measures. Once installed, the malware extracts browser cookies, stored passwords, cryptocurrency-related files, and Apple Notes – potentially exposing both personal and enterprise data. Two newly identified threat actors operate parts of these web-inject campaigns: TA2726, which may act…

Read More

Zacks Investment Research Breach Hits 12 Million

Zacks Investment Research Breach Hits 12 Million

A leading stock research and analysis firm appears to have been breached for the third time in just four years, with details from 12 million accounts published on the dark web. Published on BreachForums at the end of last month by a user with the moniker “Jurak,” the trove dates from an incident in June 2024, according to breach notification site, HaveIBeenPwned. “The 2024 breach included 12 million unique email addresses along with IP and…

Read More

The Change Healthcare breach: What changed, what didn’t, and what must

The Change Healthcare breach: What changed, what didn’t, and what must

The 2024 Change Healthcare breach marked a turning point for the healthcare industry. It exposed critical vulnerabilities in current data governance and security practices, underscoring that no organization — regardless of size or resources — is immune to cyber threats. A year later, it’s clear that while some progress has been made, there is still much to be done to protect patient data and ensure continuity of care. Lessons learned from the breach The breach…

Read More
1 32 33 34 35 36 2,645