UK's NCSC Issues Warning as SVR Hackers Target Cloud Services

UK's NCSC Issues Warning as SVR Hackers Target Cloud Services

Russian state hackers are adapting their techniques to target organizations moving to the cloud, an advisory from the UK National Cyber Security Centre and international security agencies has warned. The advisory details how cyber espionage group APT29 is directly targeting weaknesses in cloud services used by victim organizations to gain initial access to their systems. APT29 is also expanding the scope of its attacks beyond governments, think tanks, healthcare and energy providers to include victims…

Read More

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

Highlights from CrowdStrike’s 2024 report: Identity-based and social engineering attacks still take center stage. Cloud-environment intrusions have increased by 75% from 2022 to 2023. Third-party relationships exploitation makes it easier for attackers to hit hundreds of targets. CrowdStrike added 34 new threat actors in 2023. Attackers are compromising networks at a faster rate. Attackers are targeting periphery networks. CrowdStrike’s new 2024 Global Threat report exposed the latest trends in cyberattacks, and we’re highlighting the main…

Read More

Ingress security from Cisco Multicloud Defense: Protecting cloud networks and infrastructure against advanced inbound threats

Ingress security from Cisco Multicloud Defense: Protecting cloud networks and infrastructure against advanced inbound threats

Digital transformation and the cloud are driving unprecedented innovation and growth. However, the move to the cloud is expanding threat surfaces out beyond the perimeter – often on endpoints, applications, and cloud services that fall beyond the visibility and control of the organization’s security team. The lack of visibility and control across multiple clouds, regions, and accounts has created a major security gap for organizations looking to continue to innovate and grow through the scale…

Read More

Egress Security: Part of a Holistic, Multidirectional Security Strategy for Today’s Multicloud World

Egress Security: Part of a Holistic, Multidirectional Security Strategy for Today’s Multicloud World

Cloud transformation has given rise to a new era of business innovation and growth. According to Enterprise Strategy Group, more than half of production workloads will be running on public cloud infrastructure within the next two years, positioning cloud computing center-stage as the best practice for solving critical business issues and enabling agility. However, the unforeseen by-product of this evolution is complexity, and complexity is the enemy of security. Decentralized IT infrastructure, expanding threat surfaces,…

Read More

Introducing Cisco Cloud Protection – Complete Protection, from Ground to Cloud

Introducing Cisco Cloud Protection – Complete Protection, from Ground to Cloud

A few weeks ago, I was speaking with a CISO who said, “Our team is coming to the conclusion right now that we need to hire experts for every cloud – GCP, Azure, AWS – just to maintain our existing security. We don’t have the headcount for that.” This wasn’t the first time I’ve heard this. In fact, it’s become a common theme in my conversations with customers and partners. That’s because today, most organizations…

Read More

Is Your Smart TV Spying on You? | McAfee Blog

Is Your Smart TV Spying on You? | McAfee Blog

In a chilling echo of George Orwell’s dystopian novel 1984, it’s possible that Big Brother – or in this case, Big Hacker – might be surveilling you through your own television. Evidence is emerging that Smart TVs can be just as prone to hacking as home computers. Security analysts Aaron Grattafiori and Josh Yavor from iSEC Partners have spent several months investigating this issue, working alongside Smart TV manufacturers to address potential vulnerabilities. They presented…

Read More

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

In the active Elektra-Leak campaign, attackers hunt for Amazon IAM credentials within public GitHub repositories before using them for cryptomining. Get tips on mitigating this cybersecurity threat. Image: WhataWin New research from Palo Alto Networks’s Unit 42 exposes an active attack campaign in which a threat actor hunts for Amazon IAM credentials in real time in GitHub repositories and starts using them less than five minutes later. The final payload runs customized Monero cryptomining software…

Read More

Everything You Need to Know About Microsoft’s New $5 Billion Investment in Australia

Everything You Need to Know About Microsoft’s New  Billion Investment in Australia

Microsoft plans to more than double its cloud computing capacity in Australia over the next two years and expand its support for critical national cyber security and technology skills priorities. Fast-growing demand for cloud computing services across Australia has seen Microsoft announce the injection of AU $5 billion (US $3.2 billion) into the market, in a move it says will support Australia’s ability to seize the economic and productivity advantages of artificial intelligence. Flanked by…

Read More

Remote Scripts with Cisco Secure Endpoint: Defend your endpoint from attackers without business disruption

Remote Scripts with Cisco Secure Endpoint: Defend your endpoint from attackers without business disruption

Bad actors go to great lengths to evade detection and gain access to your network. Once attackers establish a foothold on the endpoint, they can persist on the endpoint, even if some of the attacker’s artifacts are blocked by a security tool. Incident responders have long struggled to fully revert all persistent mechanisms, leading to reoccurring malware on the endpoints, with potential lateral movement and exfiltration to follow. With the introduction of Remote Scripts powered…

Read More

How to Enable Passkeys For Your Google Account

How to Enable Passkeys For Your Google Account

Enable passkeys today for fast and secure access to your Google accounts. And Google Workspace administrators may allow people in their organization to use passkeys, too. When compared to a conventional password, a passkey offers an easier and faster way to sign into your Google account. You may add a passkey for any personal Google account, but you’ll need to wait until an administrator allows passkey access for any Google Workspace accounts (e.g., such as…

Read More
1 2 3 4 5 14