New AI Security Guidelines Published by NCSC, CISA & More International Agencies

New AI Security Guidelines Published by NCSC, CISA & More International Agencies

The U.K.’s National Cyber Security Centre, the U.S.’s Cybersecurity and Infrastructure Security Agency and international agencies from 16 other countries have released new guidelines on the security of artificial intelligence systems. The Guidelines for Secure AI System Development are designed to guide developers in particular through the design, development, deployment and operation of AI systems and ensure that security remains a core component throughout their life cycle. However, other stakeholders in AI projects should find…

Read More

Challenges, Trends and Opportunities for Healthcare Cybersecurity Leaders

Challenges, Trends and Opportunities for Healthcare Cybersecurity Leaders

When managing cybersecurity risk, healthcare has always had higher stakes. When a healthcare organization experiences a cyber attack, it’s about more than just money or reputation – it can be life or death in terms of patient care and treatment.   For this reason, I’m passionate about helping healthcare cybersecurity leaders to address their greatest security challenges and capitalize on emerging trends and opportunities in the security space.   I was thrilled to sit down with the…

Read More

Australian SMBs Feel the Cyber Security Heat: Here’s What IT Pros Can Do to Help

Australian SMBs Feel the Cyber Security Heat: Here’s What IT Pros Can Do to Help

60% of Australian small businesses don’t survive a cyber breach. What can the overworked IT pros in small businesses do with limited budgets against the cyber crime wave? The internet is a difficult space for Australian small and midsize businesses at the moment. Not only does the rate of innovation challenge them to adopt disruptive new technologies with minimal resources, but they also have to contend with the same cyber threats as all other businesses….

Read More

Atomic Stealer Distributes Malware to Macs Through False Browser Downloads

Atomic Stealer Distributes Malware to Macs Through False Browser Downloads

Atomic Stealer malware advertises itself through ClearFake browser updates disguised as Google’s Chrome and Apple’s Safari. Anti-malware software provider Malwarebytes has described a new variant of Atomic Stealer (also known as AMOS), which is malware targeting Apple users. The new malware variant, distributed through the fake browser update delivery mechanism ClearFake, advertises itself as updates for Apple’s Safari browser and Google’s Chrome browser. The malware is capable of grabbing a user’s data and sending it…

Read More

Sekoia: Latest in the Financial Sector Cyber Threat Landscape

Sekoia: Latest in the Financial Sector Cyber Threat Landscape

A new report from French-based cybersecurity company Sekoia describes evolutions in the financial sector threat landscape. The sector is the most impacted by phishing worldwide and is increasingly targeted by QR code phishing. The financial industry also suffers from attacks on the software supply chain and stands among the most targeted sectors impacted by ransomware in 2023. And an increase in attacks on Android smartphones affects the sector, both for cybercrime and cyberespionage operations. Jump…

Read More

Kaspersky’s Advanced Persistent Threats Predictions for 2024

Kaspersky’s Advanced Persistent Threats Predictions for 2024

Kaspersky’s new report provides the company’s view on the advanced persistent threats landscape for 2024. Existing APT techniques will keep being used, and new ones will likely emerge, such as the increase in AI usage, hacktivism and targeting of smart home tech. New botnets and rootkits will also likely appear, and hacker-for-hire services might increase, as will supply chain attacks, which might be provided as a service on cybercriminals’ underground forums. Jump to: More exploitation…

Read More

Cisco’s Journey to DoD 8140 Accreditation 

Cisco’s Journey to DoD 8140 Accreditation 

The CIO for the U.S. Department of Defense (DoD) has recently issued DoD Manual 8140.03 Cyberspace Workforce Qualification & Management Program. This is a role-based approach to identify, develop, and qualify individuals who have federal work roles that align to the DoD Cyber Workforce Framework (DCWF).  The new 8140 mandate will impact a larger number of federal employees and contractors, additionally vendors supporting programs may also need to qualify.       As the world of Cybersecurity…

Read More

Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack

Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack

Any company that is strategic could be targeted for the same kind of actions as this cyberattack. Follow these tips to mitigate your company’s risk to this cybersecurity threat. Mandiant, a cybersecurity company owned by Google, has revealed the details of a 2022 cyberattack run by Russian threat actor Sandworm. The threat actor compromised a Ukrainian critical infrastructure organization to manipulate its operational technology environment, resulting in a power outage that coincided with mass missile…

Read More

Australian Nonprofit Cyber Security Is So Poor It Might Be Affecting Donations

Australian Nonprofit Cyber Security Is So Poor It Might Be Affecting Donations

Image: Adobe/immimagery The not-for-profit sector is one of Australia’s biggest employers and revenue sources. 1.4 million people work in the not-for-profit sector in Australia, and another 3.2 million people volunteer. The overall revenue of the sector is $190 billion, and that money goes directly into supporting critical causes across the country. Unfortunately, according to new research by Infoxchange, the sector is ill-equipped to handle the security requirements of modern IT environments, and that is not…

Read More

Microsoft and SysAid Find Clop Malware Vulnerability

Microsoft and SysAid Find Clop Malware Vulnerability

SysAid has patched a zero-day vulnerability that could allow attackers to exfiltrate data and launch ransomware. On Nov. 8, SysAid, an Israel-based IT service management software company, reported a potentially exploited zero-day vulnerability in their on-premises software. Users of their on-premises server installations were encouraged to run version 23.3.36, which contained a fix. Microsoft Threat Intelligence analyzed the threat and found that Lace Tempest had exploited it. The vulnerability was exploited by the threat group…

Read More
1 14 15 16 17 18 22