Cisco Decipher: Enhancing US Public Sector Cybersecurity Knowledge

Cisco Decipher: Enhancing US Public Sector Cybersecurity Knowledge

Cybersecurity has become a foundational pillar for every government institution. And the US Public Sector, which handles sensitive data and encompasses a mass of critical infrastructure, has become a prime target for cyber threats. So, it’s imperative that public sector organizations stay ahead of the curve in cybersecurity practices. Enter Cisco Decipher, a knowledge hub that takes a practical approach to covering information security, providing clear and insightful cybersecurity information. Today I’ll discuss exactly what…

Read More

Sharing Isn’t Always Caring: 3 Tips to Help Protect Your Online Privacy

Sharing Isn’t Always Caring: 3 Tips to Help Protect Your Online Privacy

When it comes to protecting your privacy, take a close look at your social media use—because sharing can quickly turn into oversharing. The term “oversharing” carries several different definitions. Yet in our case here, oversharing means saying more than one should to more people than they should. Consider the audience you have across your social media profiles. Perhaps you have dozens, if not hundreds of friends and followers. All with various degrees of closeness and…

Read More

Cisco Talos: Top Ransomware TTPs Exposed

Cisco Talos: Top Ransomware TTPs Exposed

Cisco Talos analyzed the top 14 ransomware groups between 2023 and 2024 to expose their attack chain and highlight interesting Tactics,Techniques and Protocols. The security company also exposed the most leveraged vulnerabilities being triggered by ransomware actors. Ransomware attack chain: What Cisco Talos researchers learned Ransomware actors nearly all use the same attack chain. Typical ransomware attack chain. Image: Cisco Talos Step one for ransomware actors The first step for the threat actor consists of…

Read More

OpenAI Secrets Stolen in 2023 After Internal Forum Was Hacked

OpenAI Secrets Stolen in 2023 After Internal Forum Was Hacked

The online forum OpenAI employees use for confidential internal communications was breached last year, anonymous sources have told The New York Times. Hackers lifted details about the design of the company’s AI technologies from forum posts, but they did not infiltrate the systems where OpenAI actually houses and builds its AI. OpenAI executives announced the incident to the whole company during an all-hands meeting in April 2023, and also informed the board of directors. It…

Read More

Cyber Insurance Premiums Are Declining, Howden Insurance Brokers Report Finds

Cyber Insurance Premiums Are Declining, Howden Insurance Brokers Report Finds

Improved cyber hygiene among businesses has led to a reduction in cyber insurance premiums by 15% worldwide over the last two years, a new report from Howden Insurance Brokers has found. This is despite the fact that cyberthreats, particularly ransomware attacks, are becoming more prevalent. Awareness of cyber hygiene practices, like multifactor authentication, EDR and cloud backups, has grown significantly since 2022. Ransomware attacks have increased by 18% this year, according to Howden and NCC…

Read More

Operation Endgame: The ultimate troll patrol.

Operation Endgame: The ultimate troll patrol.

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.  Being a security researcher is…

Read More

Ransomware Cheat Sheet for 2024: What Is Ransomware?

Ransomware Cheat Sheet for 2024: What Is Ransomware?

Ransomware is arguably the most high-profile security threat of the moment. Cybercriminals across the world are demanding money from victims by holding their devices and data hostage. This type of attack, in which data is encrypted or claimed to be and victims are prompted to pay for the key to restore access, has been growing rapidly since 2013 and is now one of the most common types of malware. TechRepublic’s cheat sheet about ransomware is…

Read More

Digital Forensics for Investigating the Metaverse

Digital Forensics for Investigating the Metaverse

The intriguing realm of the metaverse should not make us overlook its cybersecurity hazards. Metaverse adoption has been steadily increasing worldwide, with various existing examples such as virtual weddings, auctions, and the establishment of government offices and law enforcement agencies. Prominent organizations like INTERPOL and others are investing considerable time and resources, underscoring the importance of the metaverse. While the growth of the metaverse has been substantial, its full potential has not yet been realized…

Read More

America's drinking water is facing attack, with links back to China, Russia and Iran

America's drinking water is facing attack, with links back to China, Russia and Iran

Houston Chronicle/hearst Newspapers Via Getty Images | Hearst Newspapers | Getty Images The city of Wichita, Kansas, recently had an experience that’s become all too common — its water system was hacked. The cyberattack, which targeted water metering, billing and payment processing, followed the targeting of water utilities across the U.S. in recent years. In going after America’s water, hackers aren’t doing anything special. Despite rising fears of AI use in cyber threats, the go-to…

Read More

Gartner: 3 Actions to Achieve Cybersecurity Consolidation

Gartner: 3 Actions to Achieve Cybersecurity Consolidation

Cybersecurity leaders are grappling with the complexity, overlap and blind spots that come from using multiple cybersecurity vendors and tools. Many of the products offered by cybersecurity vendors have overlapping capabilities, making it easy for misconfigurations to occur and difficult to uncover security gaps. Consolidating cybersecurity products reduces this complexity by streamlining the number of products and their interactions, thus improving efficiency of security outcomes. Organizations consolidate security solutions for a variety of reasons, such…

Read More
1 7 8 9 10 11 25