Phishing remains the preferred technique among threat actorsPhishing is the primary method used by cybercriminals, with significant increases in sophisticated targeting techniques.
New Linux Malware 'Auto-Color' Grants Hackers Full Remote Access to Compromised SystemsAuto-Color malware targets universities and organizations, allowing full remote access and evading detection through various techniques.
Malware-free attacks surged in 2024 as attackers drop malicious software for legitimate toolsCyber attacks are increasingly malware-free, leveraging trusted services and valid accounts for malicious activities.
Security leaders discuss botnet attack against Microsoft 365 accountsA major botnet is using evolved tactics to launch password spraying attacks on Microsoft 365 accounts, evading traditional security detections.
Notorious crooks broke into a company network in 48 minutes. Here's how.Attackers are moving faster than ever, and so must defenders to prevent data breaches.
AI vs AI: In the age of AI-driven attacks, only AI can keep upGenerative AI is transforming cybersecurity by enabling sophisticated attacks that SOC teams must counter with their own AI tools.
Phishing remains the preferred technique among threat actorsPhishing is the primary method used by cybercriminals, with significant increases in sophisticated targeting techniques.
New Linux Malware 'Auto-Color' Grants Hackers Full Remote Access to Compromised SystemsAuto-Color malware targets universities and organizations, allowing full remote access and evading detection through various techniques.
Malware-free attacks surged in 2024 as attackers drop malicious software for legitimate toolsCyber attacks are increasingly malware-free, leveraging trusted services and valid accounts for malicious activities.
Security leaders discuss botnet attack against Microsoft 365 accountsA major botnet is using evolved tactics to launch password spraying attacks on Microsoft 365 accounts, evading traditional security detections.
Notorious crooks broke into a company network in 48 minutes. Here's how.Attackers are moving faster than ever, and so must defenders to prevent data breaches.
AI vs AI: In the age of AI-driven attacks, only AI can keep upGenerative AI is transforming cybersecurity by enabling sophisticated attacks that SOC teams must counter with their own AI tools.
Sysdig scores security - Machines 40,000 : Humans 1Machine identities greatly outnumber human identities, posing significant risks in cloud security.
Hunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC Automation - DevOps.comHunters introduces Pathfinder AI for enhanced, autonomous threat detection and response in Security Operations Centers (SOCs).
Exabeam promises a revolution for SOC automationExabeam's New-Scale SOC platform updates enhance threat detection and integration through Open API support and New-Scale Analytics.
Hunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC Automation - DevOps.comHunters introduces Pathfinder AI for enhanced, autonomous threat detection and response in Security Operations Centers (SOCs).
Exabeam promises a revolution for SOC automationExabeam's New-Scale SOC platform updates enhance threat detection and integration through Open API support and New-Scale Analytics.
Army experimenting with AI to supplement physical securityThe US Army's Scylla AI can identify threats from a mile away with over 96% accuracy, transforming security operations.
Product spotlight on video surveillanceAdvancements in video surveillance integrate AI technology for enhanced threat detection and security management across various sectors.
Army experimenting with AI to supplement physical securityThe US Army's Scylla AI can identify threats from a mile away with over 96% accuracy, transforming security operations.
Product spotlight on video surveillanceAdvancements in video surveillance integrate AI technology for enhanced threat detection and security management across various sectors.
Stat(s) Of The Week: AI Can Perpetuate And Prevent ScamsAI-powered deepfake technology poses an existential threat to businesses, yet its application can lead to lower cyber insurance costs.
Using artificial intelligence (AI) to track and analyze cyber risksAI is set to transform cyber security, improving threat detection and productivity but may lead to overreliance by professionals.
AI security: Safeguarding schools beyond surveillanceSchools rely on surveillance cameras (91%) but struggle to keep pace with evolving security threats. AI systems enhance proactive threat detection capabilities.
Using artificial intelligence (AI) to track and analyze cyber risksAI is set to transform cyber security, improving threat detection and productivity but may lead to overreliance by professionals.
AI security: Safeguarding schools beyond surveillanceSchools rely on surveillance cameras (91%) but struggle to keep pace with evolving security threats. AI systems enhance proactive threat detection capabilities.
Rubrik and Mandiant plan to transform incident response with new dealRubrik partners with Mandiant for faster threat detection and recovery times.
API and data security remain top threatsFinancial institutions face challenges in compliance and understanding API activity, making them vulnerable to threats and breaches.
Game-changing data security in secondsLepide Data Security Platform offers streamlined data protection with real-time visibility and threat detection.
API and data security remain top threatsFinancial institutions face challenges in compliance and understanding API activity, making them vulnerable to threats and breaches.
Game-changing data security in secondsLepide Data Security Platform offers streamlined data protection with real-time visibility and threat detection.
The Urgent Need To Protect AIAI in cybersecurity brings both enhanced defense capabilities and heightened risks that demand urgent attention.
How AI is Used in Proactive Cybersecurity OperationsAI is crucial for proactive cybersecurity operations, helping detect, prevent threats, and predict future attacks.
The Urgent Need To Protect AIAI in cybersecurity brings both enhanced defense capabilities and heightened risks that demand urgent attention.
How AI is Used in Proactive Cybersecurity OperationsAI is crucial for proactive cybersecurity operations, helping detect, prevent threats, and predict future attacks.
How DHS is hustling to leverage-and contain-generative AIThe Department of Homeland Security utilizes AI to analyze threat data for various purposes, from preventing attacks to generating images for investigations.
Sonatype exposes malicious PyPI package 'pytoileur'Sonatype discovered a malicious PyPI package 'pytoileur' within a larger campaign, showcasing the importance of robust security measures in the coding community.
How DHS is hustling to leverage-and contain-generative AIThe Department of Homeland Security utilizes AI to analyze threat data for various purposes, from preventing attacks to generating images for investigations.
Sonatype exposes malicious PyPI package 'pytoileur'Sonatype discovered a malicious PyPI package 'pytoileur' within a larger campaign, showcasing the importance of robust security measures in the coding community.
Westcon-Comstor and Vector AI expand European distribution agreementWestcon-Comstor expands partnership with AI security provider Vector AI into UK, Ireland, and Nordic markets.
CrowdStrike CEO: Embrace AI or be crushed by cyber crooksThose who fail to embrace AI in security operations will be vulnerable to modern cyber threats.
Versa Networks adds AI capabilities to SASE platform | Computer WeeklyVersa Networks enhances AI/ML capabilities in SASE platform to improve threat detection and data protection.
Lowering potential impact of zero-day vulnerabilities with New RelicZero-day vulnerabilities are dangerous as they allow attackers to exploit unknown flaws before developers can patch them.Traditional security measures like signature-based detection systems are often ineffective against zero-day threats, highlighting the need for advanced monitoring tools.
Building a Cyber Threat Hunting Team: Methods, Strategies and Technologies | TechRepublicCyber threat hunting aims to detect malicious activities and enhance an organization's resilience against attacks.Hypothesis-driven hunting involves forming assumptions based on threat intelligence to uncover potential security breaches.
Viavi enhances sensing for fibre-enabled critical infrastructure | Computer WeeklyViavi Solutions launches Nitro Fiber Sensing for real-time asset monitoring and threat detection in various industries.
78% of organizations are tracking AI risks78% of organizations track AI as an emerging risk while utilizing it for efficiency and digital risk improvement.