Google Cloud's Cybersecurity Predictions of 2024 and Look Back at 2023

Google Cloud's Cybersecurity Predictions of 2024 and Look Back at 2023

Generative AI can be used by attackers, but security professionals shouldn’t lose sleep over it, according to a Google Cloud threat intelligence analyst. Find out why. Google Cloud’s team recently spoke about the most notable cybersecurity threats of 2023 — multi-faceted extortion and zero-day exploitation — and predicted more zero-day attacks in 2024, during two public, virtual sessions. Plus, Google predicts that both attackers and defenders will continue to use generative AI. However, generative AI…

Read More

BlackCat/ALPHV Ransomware Site Seized in International Takedown Effort

BlackCat/ALPHV Ransomware Site Seized in International Takedown Effort

The ransomware group, which has distributed ransomware to more than 1,000 victims, reportedly recovered control of its website on Tuesday. Learn how to defend against ransomware. Image: Adobe/igor.nazlo On Dec. 19, the Department of Justice announced the FBI had been working on a disruption campaign against the ransomware group known as ALPHV, Noberus or BlackCat that resulted in the seizure of several of the group’s websites, visibility into their network and a decryption tool that…

Read More

Cyber Security Trends to Watch in Australia in 2024

Cyber Security Trends to Watch in Australia in 2024

Ransomware attacks on infrastructure and mid-market businesses are tipped to rise, while the use of AI cyber tools will grow as IT customers seek more signal and less noise from vendors. The year 2023 was a big year for cyber security professionals in Australia. While IT teams continued to deal with the fallout of some big Australian data breaches, the new 2023-2030 Australian Cyber Security Strategy was released to boost defences against future threats. Experts…

Read More

How to build cyber resilience in a rapidly evolving threat landscape

How to build cyber resilience in a rapidly evolving threat landscape

The ransomware landscape is ever evolving and it can seem as though there is a new headline about a breach, extortion demand or fallout after an attack every day. But how can security leaders build cyber resilience?  Here, we talk to Justin Shattuck, Chief Information Security Officer (CISO) at Resilience Security magazine: Tell us about your title and background.  Shattuck: I currently serve as the CISO for Resilience, a cyber risk company bridging the divide between…

Read More

Why are phishing attacks destroying SMBs?

Why are phishing attacks destroying SMBs?

Phishing scams have become an all-too-common threat. Through spear fishing, vishing and other forms of social engineering, cybercriminals trick business owners and employees into disclosing sensitive information like credentials and passwords, eventually resulting in data breaches and ransomware installations on a business’s network. According to Accenture, 43% of cyberattacks are aimed at small businesses. But why have these attacks become so prevalent and so successful? Macro trends have pushed workplaces to permanently adopt a hybrid…

Read More

The threat landscape in H1 2023

The threat landscape in H1 2023

Cyber threats such as ransomware, artificial intelligence and malware have remained top concerns for security leaders. New technologies and new threat actors have changed the threat landscape, leading security leaders to adjust cybersecurity plans. According to a Check Point report, the education sector has remained the top cyberattack target through the first half of 2023, followed by the government and/or military and healthcare. The report found that retail had a 42% increase in cyberattacks —…

Read More

Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

The Cisco Talos Year in Review report released Tuesday highlights new trends in the cybersecurity threat landscape. We’ll focus on three topics covered: the ransomware cybercriminal ecosystem, network infrastructure attacks and commodity loader malware. More ransomware actors switched to extortion rather than encryption, while commodity loaders evolved to be stealthier and highly effective, although new major security improvements have seen the day in 2023, such as Microsoft Office disabling macros by default. Network devices are…

Read More

Sekoia: Latest in the Financial Sector Cyber Threat Landscape

Sekoia: Latest in the Financial Sector Cyber Threat Landscape

A new report from French-based cybersecurity company Sekoia describes evolutions in the financial sector threat landscape. The sector is the most impacted by phishing worldwide and is increasingly targeted by QR code phishing. The financial industry also suffers from attacks on the software supply chain and stands among the most targeted sectors impacted by ransomware in 2023. And an increase in attacks on Android smartphones affects the sector, both for cybercrime and cyberespionage operations. Jump…

Read More

Microsoft and SysAid Find Clop Malware Vulnerability

Microsoft and SysAid Find Clop Malware Vulnerability

SysAid has patched a zero-day vulnerability that could allow attackers to exfiltrate data and launch ransomware. On Nov. 8, SysAid, an Israel-based IT service management software company, reported a potentially exploited zero-day vulnerability in their on-premises software. Users of their on-premises server installations were encouraged to run version 23.3.36, which contained a fix. Microsoft Threat Intelligence analyzed the threat and found that Lace Tempest had exploited it. The vulnerability was exploited by the threat group…

Read More

The road ahead for identity management

The road ahead for identity management

The road ahead for identity management | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 2 3 4 5 38