#cyber threats

[ follow ]
network-security
Ars Technica
1 week ago
Information security

Critical vulnerabilities in BIG-IP appliances leave big networks open to intrusion

The BIG-IP Next Central Manager, extensively used for network management, faces critical vulnerabilities, exposing top corporations to potential cyber intrusion. [ more ]
Forbes
1 month ago
Privacy professionals

Council Post: Five Steps To Get Your Network Security Ready For The Future

Remote work blurs the line between work and home networks, challenging traditional security perimeters.
Sophisticated threats like advanced persistent threats and insiders present significant security challenges in a borderless network environment. [ more ]
TechRepublic
2 months ago
Information security

Best Secure Access Service Edge Platforms in 2024 | TechRepublic

SASE integrates SD-WAN and cloud-native security features for a comprehensive network security approach.
Organizations should consider factors like cost, security needs, and seamless integration when choosing a SASE platform. [ more ]
morenetwork-security
ransomware
Theregister
1 week ago
Information security

CISA's ransomware warnings helped critical orgs fix 852 bugs

US government's CISA is actively assisting critical infrastructure organizations in addressing vulnerabilities exploited by ransomware gangs to prevent attacks. [ more ]
Axios
3 months ago
Privacy professionals

New data shows fewer ransomware victims are paying hackers

The percentage of organizations paying ransomware has dropped significantly, from 85% in Q1 2019 to 29% in Q4 2024.
The average ransom payment in Q4 2023 was $568,000, a 33% drop from the previous quarter. [ more ]
TechRepublic
3 months ago
Artificial intelligence

UK Study: Generative AI May Increase Ransomware Threat

Generative AI may increase risks from cyber threats such as ransomware.
Generative AI will provide a 'capability uplift' to existing threats rather than creating brand new threats. [ more ]
moreransomware
ITPro
1 week ago
Privacy professionals

China blamed for Ministry of Defence attack that exposed military personnel data

A Ministry of Defence (MoD) data breach exposed personal data of UK military personnel due to a compromised third-party payroll system. [ more ]
Yanko Design - Modern Industrial Design News
1 week ago
Privacy professionals

Upgrade Your WiFi with Unmatched Privacy and Safe Connectivity at Home or Anywhere in the World - Yanko Design

Rio system transforms WiFi router into a highly secure hub, enhancing protection against cyber threats. [ more ]
TechRepublic
1 week ago
Privacy professionals

How Can Businesses Defend Themselves Against Cyberthreats?

Businesses face growing cyberattack risks due to increased online data, accessible cyber tools, and evolving attack methods. [ more ]
London Business News | Londonlovesbusiness.com
10 hours ago
Privacy professionals

Securing your digital playground: A guide to online gaming security

Gaming exposes individuals to cyber threats like hacking, malware, identity theft, and scams, necessitating precautions for protection. [ more ]
Nextgov.com
1 month ago
Privacy professionals

Some banks moving too slow to address AI-powered cyberthreats, Treasury says

Financial institutions slow to adopt AI-driven cybersecurity frameworks
AI chatbots enhancing cybercriminal capabilities [ more ]
Nextgov.com
2 months ago
Privacy professionals

NIST debuts the finalized update to its Cybersecurity Framework

Robust governance practices crucial for facing evolving cyber risks
CSF 2.0 emphasizes cybersecurity governance for effective management. [ more ]
ITPro
1 week ago
Artificial intelligence

CrowdStrike CEO: Embrace AI or be crushed by cyber crooks

Those who fail to embrace AI in security operations will be vulnerable to modern cyber threats. [ more ]
Linkedin
6 hours ago
Artificial intelligence

How AI Is Changing The World Of Cybersecurity

AI enables both sophisticated cyber attacks and advanced defense mechanisms in the cybersecurity landscape. [ more ]
Axios
1 month ago
Artificial intelligence

"Top secret" is no longer the key to good intel in an AI world, report finds

US intelligence needs advanced AI to process data flood and enhance national competitiveness over traditional security focus. [ more ]
Nextgov.com
1 month ago
Artificial intelligence

AI is creating 'more sophisticated' but not unprecedented election threats, DHS official says

AI tools contributing to more sophisticated misinformation.
Phishing campaigns using generative AI can increase likelihood of election personnel being targeted. [ more ]
Nextgov.com
4 months ago
Artificial intelligence

New AI tools spawn fears of greater 2024 election threats, survey finds

Over half of state and local officials are not prepared to detect and recover from election-targeted cyber incidents.
Officials are concerned that the election cyber threat landscape in 2024 will be worse than in 2020, with AI tools posing unfamiliar challenges. [ more ]
Theregister
1 week ago
Information security

Te years since the first corp ransomware and no end in sight

Ransomware attacks on corporations have increased over the past decade, with no sign of slowing down, posing a significant threat to information security. [ more ]
CyberScoop
1 week ago
Information security

House panel leaders call on Microsoft president to testify over security shortcomings

The House Homeland Security Committee requests Microsoft President Brad Smith to testify following cybersecurity incidents. [ more ]
euronews
1 week ago
Information security

'Cyberwarriors' prepare against attacks during Paris Olympics

France anticipates increased cyber threats during the upcoming Paris Olympic Games, particularly from Russian actors. [ more ]
CyberScoop
2 weeks ago
Information security

Easterly appeals to Congress on CISA funding, citing Chinese threats to critical infrastructure

More funding is crucial for CISA to enhance cybersecurity defense, particularly against Chinese hackers in critical infrastructure. [ more ]
TNW | Data-Security
2 weeks ago
Information security

New UK cybersecurity law will make weak passwords a thing of the past

Consumer smart devices in the UK must now adhere to minimum-security standards, including prohibiting weak passwords like 'admin' or '12345'. [ more ]
Databreaches
3 months ago
Information security

HHS Releases New Voluntary Performance Goals to Enhance Cybersecurity Across the Health Sector and Gateway for Cybersecurity Resources

The U.S. Department of Health and Human Services is releasing voluntary cybersecurity performance goals (CPGs) for healthcare organizations.
The goal is to help healthcare organizations prioritize high-impact cybersecurity practices and protect against cyber threats. [ more ]
www.france24.com
2 months ago
France politics

Science - Paris 2024 Olympics: A colossal challenge for cybersecurity

4 billion people expected to watch Paris 2024 Olympics
High risk of cyber threats during the Games [ more ]
DevOps.com
2 months ago
Privacy professionals

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On - DevOps.com

ThreatHunter.ai offers free cybersecurity services for 30 days to all organizations.
The cybersecurity landscape is increasingly volatile, with cyber threats becoming more sophisticated. [ more ]
www.fastcompany.com
2 months ago
Privacy professionals

Meet the shady companies helping governments hack citizens' phones

Pegasus malware can infiltrate phones without user knowledge, recording sensitive data in real-time.
Despite scrutiny and sanctions, the cyberattack market is growing, aiding government violence and eroding democracy globally. [ more ]
Nextgov.com
2 months ago
Privacy professionals

Biden to sign executive order boosting cybersecurity of ports, maritime vessels

President Biden expected to sign executive order to boost maritime cybersecurity through DHS and U.S. Coast Guard.
Order mandates vessels and ports to enhance cybersecurity defenses, comply with incident reporting rules, and establish minimum cybersecurity standards. [ more ]
readwrite.com
3 months ago
Privacy professionals

US thwarts Russian hacking network infiltrating American homes

The U.S. Justice Department has disrupted a major Russian intelligence-controlled hacking network that was using hacked home and small business internet routers for spying.
The U.S. government is increasingly concerned about cyber threats from major adversaries like Russia, China, and Iran. [ more ]
www.sherwoodgazette.com
3 months ago
National Basketball Association

Barbara Jean (Eversole) Maplethorpe

Takeaway 1: The article discusses the importance of cybersecurity in today's digital age.
Takeaway 2: The article highlights the need for individuals and organizations to stay vigilant and proactive in protecting against cyber threats. [ more ]
ComputerWeekly.com
3 months ago
Privacy professionals

Inquiry to explore cyber risk to Sunak-Starmer showdown | Computer Weekly

The UK government's Joint Committee on the National Security Strategy has launched an inquiry into securing the democratic process against cyber threats ahead of the next general election.
The committee has highlighted the risk of cyber attacks and foreign interference in elections, citing the 2019 general election and the increasing scope of the cyber threat landscape. [ more ]
Forbes
3 months ago
Privacy professionals

Council Post: Don't Break The Bank: Stopping Ransomware From Getting The Best Of Your Business

Ransomware attacks continue to be a serious threat to organizations despite high cyber spending.
The landscape of cyber threats has fundamentally changed with the cloud, mobility, and hybrid work, requiring a change in security measures. [ more ]
Bloomberg
3 months ago
Privacy technologies

Bloomberg

Organizations need to prioritize cybersecurity to protect against cyber threats
Implementing multi-factor authentication and regular employee training can help prevent attacks [ more ]
CyberScoop
5 months ago
Information security

Cyber threats change daily. Have your endpoint and vulnerability management capabilities kept pace?

Endpoint and vulnerability management capabilities need to keep pace with daily changing cyber threats.
Lessons from the SolarWinds hack highlight the importance of EDR and vulnerability identification and remediation.
Generating a Software Bill of Materials is critical for security operations. [ more ]
London Business News | Londonlovesbusiness.com
5 months ago
Information security

Cybersecurity consulting: Enhancing your digital defence

IT security consulting is essential in the digital age to protect businesses from cyber threats.
The digital battlefield is filled with various types of attacks, including phishing, ransomware, DDoS, insider threats, zero-day vulnerabilities, man-in-the-middle attacks, credential stuffing, and IoT vulnerabilities. [ more ]
Entrepreneur
5 months ago
Information security

Cybersecurity Attacks Are On the Rise - Is Your Business Prepared? | Entrepreneur

The traditional castle-and-moat approach to cybersecurity is inadequate in the face of evolving threats.
Continuous monitoring is a proactive and comprehensive approach to cybersecurity that allows organizations to stay one step ahead of cyber adversaries. [ more ]
Theregister
5 months ago
Privacy professionals

US and EU infosec bodies sign intel-sharing pact

The US Cybersecurity and Infrastructure Security Agency (CISA) and the European Union Agency for Cybersecurity (ENISA) have signed a working arrangement to enhance cross-border information sharing and cooperation in tackling cyber threats.
The agreement focuses on sharing best practices for incident reporting and threat intelligence on basic cyber threats, as well as addressing common challenges in the cyber threat landscape. [ more ]
Nextgov.com
5 months ago
Privacy professionals

20 federal agencies miss deadline for implementing cyber incident tracking requirements, watchdog says

Many federal agencies have failed to meet the cybersecurity requirements set by the Biden administration, including advanced event logging standards.
The failure to implement event logging requirements hampers the federal government's ability to detect, investigate, and remediate cyber threats. [ more ]
ComputerWeekly.com
5 months ago
Privacy professionals

Prepare for your worst day: How to create a cyber incident response plan | Computer Weekly

Cyber threats and attacks are increasing in frequency and sophistication.
Organizations need to be prepared and have a plan in place to respond to cyber incidents.
Time is of the essence in responding to a cyber incident. [ more ]
www.databreaches.net
5 months ago
Public health

CISA Releases The Mitigation Guide: Healthcare and Public Health (HPH) Sector

CISA has released a mitigation guide for the Healthcare and Public Health sector to combat cyber threats.
The guide provides defensive mitigation strategy recommendations and identifies known vulnerabilities for organizations to assess their networks.
HPH entities are encouraged to visit CISA's Healthcare and Public Health Cybersecurity Toolkit and Sector webpages for more information. [ more ]
Axios
5 months ago
Information security

U.S. cyber defense agency has some advice for health care organizations

The Cybersecurity and Infrastructure Security Agency (CISA) has released new guidelines for healthcare organizations to mitigate cybersecurity risks.
The guidelines recommend implementing multi-factor authentication, taking inventory of online assets, and encrypting sensitive information.
CISA aims to create a central resource for healthcare cybersecurity professionals to tackle cyber threats. [ more ]
SecurityWeek
6 months ago
Privacy professionals

UK Cybersecurity Center Says 'Deepfakes' and Other AI Tools Pose a Threat to the Next Election

Artificial intelligence poses a threat to Britain's next national election.
Cyberattacks by hostile countries and their proxies are proliferating and getting harder to track.
State-aligned actors and China pose significant cyber threats to the UK. [ more ]
[ Load more ]