Category: EN

ENISA Launches First State of EU Cybersecurity Report

The NIS2 directive requires the EU cybersecurity agency to produce a biennial report on the state of cybersecurity in the Union This article has been indexed from www.infosecurity-magazine.com Read the original article: ENISA Launches First State of EU Cybersecurity Report

7 PAM Best Practices to Secure Hybrid and Multi-Cloud Environments

Are you using the cloud or thinking about transitioning? Undoubtedly, multi-cloud and hybrid environments offer numerous benefits for organizations. However, the cloud’s flexibility, scalability, and efficiency come with significant risk — an expanded attack surface. The decentralization that comes with…

Implementing blocklists in the Sekoia SOC platform

On a calm Friday afternoon, rumors of a new active threat starts hitting the various social network websites. Your CSIRT team starts checking the private channels they have with other CERTs and starts compiling a list of Indicators of Compromise…

The Curious Case of an Egg-Cellent Resume

Key Takeaways Private Threat Briefs: Over 20 private DFIR reports annually. Threat Feed: Focuses on tracking Command and Control frameworks like Cobalt Strike, Metasploit, Sliver, etc. All Intel: Includes everything from … Read More This article has been indexed from The…

The Shift to the Edge Continues to Accelerate

The IDC MarketScape report evaluated providers in the edge delivery services category. Read why Akamai was chosen as a Leader. This article has been indexed from Blog Read the original article: The Shift to the Edge Continues to Accelerate

Threat Assessment: Howling Scorpius (Akira Ransomware)

Howling Scorpius, active since 2023, uses Akira ransomware to target businesses globally, employing a double-extortion strategy and upgrading tools regularly. The post Threat Assessment: Howling Scorpius (Akira Ransomware) appeared first on Unit 42. This article has been indexed from Unit…

UK Ministry of Defense MoD passwords leaked on Dark Web

The United Kingdom’s Ministry of Defense (MoD) has recently made headlines after it was revealed that over 560 staff members’ passwords were exposed on the dark web, triggering widespread concern within Parliament. The breach is believed to be the work…

How Data Backups Turn Vital in Ransomware Scenarios

Ransomware attacks have become one of the most menacing threats to businesses, governments, and individuals alike. These malicious software programs encrypt vital data and demand a ransom, often in cryptocurrency, to restore access. With the growing sophistication and frequency of…

Apple espionage on its employees iPhones and iCloud accounts

In recent years, we have witnessed a growing trend of surveillance by various entities—ranging from individuals to state actors and organized groups—monitoring both public and private organizations. This trend has also extended to governments using technology like facial recognition to…