CrowdStrike Outage Disrupts Microsoft Systems Worldwide | TechRepublic

CrowdStrike Outage Disrupts Microsoft Systems Worldwide | TechRepublic

A major disruption to Windows PCs in the U.S., U.K., Australia, South Africa and other countries was caused by an error in a CrowdStrike update, the cloud security company announced on Friday. Emergency services, airports and law enforcement reported downtime, which is ongoing. “This is not a security incident or cyberattack,” CrowdStrike said in a statement. Blue Screen of Death widespread due to CrowdStrike outage Affected organizations saw the infamous Blue Screen of Death, the…

Read More

Snowflake Users Targeted for Data Theft and Extortion

Snowflake Users Targeted for Data Theft and Extortion

A new report from Mandiant, part of Google Cloud, reveals that a financially motivated threat actor named UNC5537 collected and exfiltrated data from about 165 organizations’ Snowflake customer instances. Snowflake is a cloud data platform used for storing and analyzing large volumes of data. The threat actor managed to get access to these data by triggering credentials that were previously stolen by infostealer malware or purchased from other cybercriminals. According to Mandiant, the threat actor…

Read More

Product spotlight on risk and threat monitoring

Product spotlight on risk and threat monitoring

With rapidly-evolving threats and staffing shortages, it’s becoming harder for security leaders to monitor their organizations for potential threats. Security magazine highlights a few products that help keep critical systems safe from attack. CROWDSTRIKE Proactively Searches for Threats Falcon Adversary OverWatch is a 24/7 threat hunting service that spans endpoint, identity and cloud to disrupt adversaries. The software is powered by threat intelligence and artificial intelligence (AI). The software is designed to help analysts locate threats and…

Read More

Security, the cloud, and AI: building powerful outcomes while simplifying your experience

Security, the cloud, and AI: building powerful outcomes while simplifying your experience

Over the past year, I’ve spoken with hundreds of professionals about what they expect from their network security. This question is mostly met with equal parts enthusiasm and angst. As we wrap up another successful Cisco Live, I’m eager to share the deep insights I’ve gathered from these extensive conversations and how Cisco is actively addressing your security needs. As organizations navigate application transformations and grapple with the intricacies of defending increasingly complex networks, they’re…

Read More

83% of organizations faced at least one account takeover the past year

83% of organizations faced at least one account takeover the past year

A survey from Abnormal Security reveals that account takeovers are a prominent threat. By surveying 300 security professionals across a range of industries and organization sizes, the report found that 83% of organizations claimed to have experienced at least one account takeover in the last year. Furthermore, 45.5% of organizations experienced more than five account takeover incidents in the past year, and nearly one in five experienced more than 10. The survey determined that 77%…

Read More

Proofpoint's CISO 2024 Report: Top Challenges Include Human Error & Risk

Proofpoint's CISO 2024 Report: Top Challenges Include Human Error & Risk

In Proofpoint’s 2024 Voice of the CISO report, the cybersecurity company found that CISOs are dealing with people-centric threats more than ever. Plus, cybersecurity budgets often don’t change, and AI can help and hurt CISOs’ efforts. Regarding the specific threat risks, 41% of the CISOs mostly fear ransomware attacks, followed by malware (38%), email fraud (36%), cloud account compromise (34%), insider threat (30%) and distributed denial of service (30%) attacks. Biggest threat risks as perceived…

Read More

Top 5 Cloud Trends U.K. Businesses Should Watch in 2024

Top 5 Cloud Trends U.K. Businesses Should Watch in 2024

As business data demands increase, cloud providers and their customers find themselves having to consider the implications of increasing storage costs, security risks and environmental footprint. Such impacts are of particular importance to U.K. organisations, as it is the largest cloud market in Europe. TechRepublic spoke to U.K. cloud experts to identify the top five industry trends emerging from the country’s burgeoning reliance on the fundamental IT infrastructure. These cloud trends are: Premiumisation of cloud packages….

Read More

10 Hot AI Cybersecurity Tools At RSAC 2024

10 Hot AI Cybersecurity Tools At RSAC 2024

Vendors including Palo Alto Networks, Trellix and Proofpoint debuted new AI-powered security tools and capabilities this week during the conference. Without a doubt, this year’s RSA Conference in San Francisco has lived up to expectations when it comes to the focus on generative AI. RSAC 2024 has seen countless vendors unveil new security tools and capabilities leveraging large language model technology, and for the second year in a row, GenAI has been ubiquitous in conversations…

Read More

20 Coolest Cybersecurity Products At RSAC 2024

20 Coolest Cybersecurity Products At RSAC 2024

At RSA Conference 2024 this week, vendors are showcasing new products in categories including SASE, security operations and application security — with many touting newly released, GenAI-powered cybersecurity capabilities. Big RSAC Product Announcements Even as the cybersecurity industry continues to maintain its rapid growth pace — leading many vendors to roll out product announcements throughout the year — major makers of cybersecurity tools also continue to target the launch of new products and capabilities at…

Read More

Misconfigurations drive 80% of security exposures

Misconfigurations drive 80% of security exposures

A report from XM Cyber analyzes more than 40 million exposures in order to provide a thorough understanding of the current exposure landscape. The report found that 80% of exposures are caused by identity and credential misconfigurations. Out of these exposures, one-third of them put critical assets at risk of a breach. According to the report, a majority of the exposure is within an organization’s active directory, a critical component for connecting users to network…

Read More
1 2 3 4 15