Category: EN

What is the Standard of Good Practice for Information Security?

The ISF (Information Security Forum) Standard of Good Practice (SoGP) is a comprehensive set of best practices designed to help organizations effectively manage their information security risks. Covering various topics, including governance, risk management, compliance, incident management, and technical security…

What Is the Difference between FIM and DLP?

Threats to sensitive data are everywhere. From sophisticated cybercriminal syndicates to accidental exposure to nation-state-backed advanced persistent threat (APT) groups and everything in between, it’s never been more critical for organizations to have the correct data protection tools. When designing…

RansomHub operation is a rebranded version of the Knight RaaS

Researchers believe the RansomHub ransomware-as-a-service is a rebranded version of the Knight ransomware operation. Cybersecurity experts who analyzed the recently emerged ransomware operation RansomHub speculate that is is a rebranded version of Knight ransomware. Knight, also known as Cyclops 2.0,…

GHOSTENGINE Exploit: Vulnerable Drivers Facing Attack

A recent revelation in the cybersecurity realm uncovers a concerning development dubbed GHOSTENGINE, a cryptojacking campaign employing a sophisticated method to bypass security measures. In this blog, we’ll look at the GHOSTENGINE exploit in detail, shedding light on its modus…

HYPR raises $30 million to combat threats posed by generative AI

HYPR secures $30 million in funding from Silver Lake Waterman to drive accelerated advancements in technologies to combat the rising threat of generative AI-driven credential-based attacks. This investment validates the expanded adoption of HYPR’s passwordless authentication solutions and support for…

Webinar: Exposure management and your attack surface

Your business, attack surface, and threat landscape are not static—they are constantly changing. New vulnerabilities are disclosed hourly, new exploits for old vulnerabilities are publicly released, and threat actors update their techniques continuously. Knowing where and how to prioritize your…

How to Lead an Army of Digital Sleuths in the Age of AI

Eliot Higgins and his 28,000 forensic foot soldiers at Bellingcat have kept a miraculous nose for truth—and a sharp sense of its limits—in Gaza, Ukraine, and everywhere else atrocities hide online. This article has been indexed from Security Latest Read…

IoT Security Means Remediation Not Mitigation

A topic that I recently got asked about was vulnerability mitigation for IoT systems, which shows that even within the security community there is still a belief that mitigation equals threat resolution.  For IoT systems this simply does not work…

Spain defense company servers hacked

A Spanish defense firm, Santa Barbara Systems, recently fell victim to a cyberattack allegedly originating from Russia. Reports suggest that the motive behind this attack was to disrupt support for Ukraine’s President, Volodymyr Zelenskyy. Amidst the prolonged conflict between Kyiv…

Bitcoin Heist Hits Japanese Exchange DMM Bitcoin

  In a security breach, Japanese cryptocurrency exchange DMM Bitcoin announced the theft of approximately 4,502.9 Bitcoin, valued at around 48.2 billion yen (approximately $304 million). The incident marks one of the largest cryptocurrency heists in recent history. The breach…