#threat-actors

[ follow ]
#cybersecurity
ComputerWeekly.com
3 weeks ago
Information security

Rockwell urges users to disconnect ICS equipment | Computer Weekly

Disconnect industrial control systems from public internet due to increased threat activities and CVE vulnerabilities. [ more ]
Developer Tech News
1 month ago
Information security

CISA sounds alarm on critical GitLab flaw under active exploit

Organizations should promptly apply security updates in response to active exploitation attempts. [ more ]
ComputerWeekly.com
1 month ago
Information security

Ransomware payment bans need universal buy-in | Computer Weekly

Banning ransomware payments is crucial to disrupt cyber criminals and protect organizations from repeated attacks. [ more ]
ComputerWeekly.com
2 months ago
Privacy professionals

NCSC reaffirms guidance for those at risk of Chinese state hacking | Computer Weekly

The NCSC reaffirms guidance for individuals at high risk of targeted hacking by Chinese threat actors like APT31.
NCSC highlights China's malicious activities, including transnational repression and espionage, against UK institutions and pro-democracy activists. [ more ]
Forbes
3 months ago
Privacy professionals

Council Post: AI Is Here: Prioritizing Cyber Resilience In 2024 And Beyond

Cybersecurity landscape is rapidly evolving with expanding threat surfaces
Emphasis on cyber resilience is crucial in combating sophisticated cyber threats [ more ]
Entrepreneur
3 months ago
Privacy professionals

What Business Leaders Need to Know About the 'Mother of All Breaches' | Entrepreneur

The dataset contains 26 billion leaked entries from various platforms.
The breach presents a massive threat to personal information and corporate security, providing a toolkit for cyberattacks. [ more ]
ComputerWeekly.com
3 weeks ago
Information security

Rockwell urges users to disconnect ICS equipment | Computer Weekly

Disconnect industrial control systems from public internet due to increased threat activities and CVE vulnerabilities. [ more ]
Developer Tech News
1 month ago
Information security

CISA sounds alarm on critical GitLab flaw under active exploit

Organizations should promptly apply security updates in response to active exploitation attempts. [ more ]
ComputerWeekly.com
1 month ago
Information security

Ransomware payment bans need universal buy-in | Computer Weekly

Banning ransomware payments is crucial to disrupt cyber criminals and protect organizations from repeated attacks. [ more ]
ComputerWeekly.com
2 months ago
Privacy professionals

NCSC reaffirms guidance for those at risk of Chinese state hacking | Computer Weekly

The NCSC reaffirms guidance for individuals at high risk of targeted hacking by Chinese threat actors like APT31.
NCSC highlights China's malicious activities, including transnational repression and espionage, against UK institutions and pro-democracy activists. [ more ]
Forbes
3 months ago
Privacy professionals

Council Post: AI Is Here: Prioritizing Cyber Resilience In 2024 And Beyond

Cybersecurity landscape is rapidly evolving with expanding threat surfaces
Emphasis on cyber resilience is crucial in combating sophisticated cyber threats [ more ]
Entrepreneur
3 months ago
Privacy professionals

What Business Leaders Need to Know About the 'Mother of All Breaches' | Entrepreneur

The dataset contains 26 billion leaked entries from various platforms.
The breach presents a massive threat to personal information and corporate security, providing a toolkit for cyberattacks. [ more ]
morecybersecurity
Cbsnews
4 weeks ago
Artificial intelligence

Generative AI poses threat to election security, federal intelligence agencies warn

Generative AI poses a serious threat to election security, both domestically and internationally. [ more ]
#cyber-security
ITPro
1 month ago
Information security

What's going on with Zscaler?

Zscaler's response to a security breach was commended in the cyber sector as an example of transparent disclosure amidst increased attack frequency. [ more ]
ComputerWeekly.com
2 months ago
Artificial intelligence

Threat actors look to stolen credentials | Computer Weekly

Cyber criminals are increasingly using valid accounts to breach corporate networks, necessitating a focus on distinguishing between legitimate and malicious user activity. [ more ]
Ars Technica
4 months ago
Artificial intelligence

AI will increase the number and impact of cyber attacks, intel officers say

Ransomware is predicted to be the biggest threat to benefit from AI in the next two years
AI will enhance existing threats, not transform the risk landscape [ more ]
ITPro
1 month ago
Information security

What's going on with Zscaler?

Zscaler's response to a security breach was commended in the cyber sector as an example of transparent disclosure amidst increased attack frequency. [ more ]
ComputerWeekly.com
2 months ago
Artificial intelligence

Threat actors look to stolen credentials | Computer Weekly

Cyber criminals are increasingly using valid accounts to breach corporate networks, necessitating a focus on distinguishing between legitimate and malicious user activity. [ more ]
Ars Technica
4 months ago
Artificial intelligence

AI will increase the number and impact of cyber attacks, intel officers say

Ransomware is predicted to be the biggest threat to benefit from AI in the next two years
AI will enhance existing threats, not transform the risk landscape [ more ]
morecyber-security
Ars Technica
3 months ago
Privacy professionals

Never-before-seen Linux malware gets installed using 1-day exploits

Linux malware, NerbianRAT, circulated for at least two years
CheckPoint identified Magnet Goblin using 1-day vulnerabilities to deliver Linux malware [ more ]
#ransomware
ComputerWeekly.com
3 months ago
Privacy professionals

Black Basta, Bl00dy ransomware gangs exploiting ConnectWise vulns | Computer Weekly

Ransomware gangs exploit ConnectWise ScreenConnect vulnerabilities with high CVE scores.
Multiple threat actors using leaked build of LockBit target unpatched organizations. [ more ]
Databreaches
5 months ago
Privacy technologies

Follow-on extortion campaign: confirmation of some findings by Arctic Wolf

Threat actors are using ethical researcher personas to extort money from ransomware victims.
Arctic Wolf Labs and DataBreaches believe that the same threat actor is behind multiple cases of secondary extortion. [ more ]
ComputerWeekly.com
3 months ago
Privacy professionals

Black Basta, Bl00dy ransomware gangs exploiting ConnectWise vulns | Computer Weekly

Ransomware gangs exploit ConnectWise ScreenConnect vulnerabilities with high CVE scores.
Multiple threat actors using leaked build of LockBit target unpatched organizations. [ more ]
Databreaches
5 months ago
Privacy technologies

Follow-on extortion campaign: confirmation of some findings by Arctic Wolf

Threat actors are using ethical researcher personas to extort money from ransomware victims.
Arctic Wolf Labs and DataBreaches believe that the same threat actor is behind multiple cases of secondary extortion. [ more ]
moreransomware
TechRepublic
3 months ago
Privacy professionals

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

Identity-based attacks remain prevalent
Cloud environment intrusions up by 75% from 2022 to 2023
Third-party relationships exploited for easier attacks [ more ]
ComputerWeekly.com
4 months ago
Privacy professionals

Hunter-killer malware volumes seen surging | Computer Weekly

A specialised hunter-killer malware is on the rise, capable of disabling key cybersecurity tools.
This type of malware is designed to evade security tools and bring them down, demonstrating a shift in threat actors' tactics. [ more ]
Developer Tech News
5 months ago
Information security

GitHub rotates credentials following vulnerability discovery

GitHub has rotated encryption keys following the discovery of a vulnerability that could have enabled threat actors to steal credentials.
GitHub addressed another high-severity vulnerability this week that could have allowed elevation of privilege. [ more ]
ComputerWeekly.com
7 months ago
Privacy professionals

Rogue state-aligned actors are most critical cyber threat to UK | Computer Weekly

The UK's critical national infrastructure faces an enduring and significant threat from state-aligned threat actors ramping up cyber activity.
The NCSC warns that the UK needs to enhance cyber resilience in industries such as energy, water supply, communications, logistics, and financial services.
The annual report highlights the emergence of a new class of cyber adversary in the form of state-aligned actors who are ideologically motivated. [ more ]
[ Load more ]