Category: EN

Six things we learned from the LockBit takedown

A sweeping law enforcement operation led by the U.K.’s National Crime Agency this week took down LockBit, the notorious Russia-linked ransomware gang that has for years wreaked havoc on businesses, hospitals, and governments around the world. The action saw LockBit’s…

Attackers Quick to Weaponize CVE-2023-22527 for Malware Delivery

On January 16, 2024, Atlassian disclosed a critical vulnerability affecting Confluence Data Center and Confluence Server, tracked as CVE-2023-22527. The vulnerability is an unauthenticated OGNL injection bug, allowing unauthenticated attackers to execute Java expressions, invoke methods, navigate object relationships, and…

NCSC Sounds Alarm Over Private Branch Exchange Attacks

The UK’s National Cyber Security Centre has produced new guidance for smaller firms on PBX attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: NCSC Sounds Alarm Over Private Branch Exchange Attacks

Following in Mitre’s footsteps and malware behavior

The MITRE framework helps all defenders speak the same language regarding attackers’ modus operandi. VirusTotal provides multiple data points where MITRE’s Tactics and Techniques are dynamically extracted from samples when detonated in our sandboxes. In particular, samples’ MITRE mapping can…

Attacker Breakout Time Falls to Just One Hour

It now takes threat actors on average just 62 minutes to move laterally from initial access, Crowdstrike claims This article has been indexed from www.infosecurity-magazine.com Read the original article: Attacker Breakout Time Falls to Just One Hour

Silicon In Focus Podcast: Connectivity in Orbit

Welcome to the Silicon In Focus Podcast, where we bring you the latest insights and discussions at the intersection of technology and innovation. In today’s episode, we’re diving into the fascinating world of 5G satellite communications. This article has been…

A common goal for European cyber security

Complying with the EU’s NIS2 Directive Webinar  It was growing threat levels and an increase in reported cybersecurity attacks since digitalization which pushed the European Union to introduce the original Network and Information Security (NIS) Directive in 2016.… This article…

2024’s Cyber Battleground Unveiled: Escalating Ransomware Epidemic, the Evolution of Cyber Warfare Tactics and strategic use of AI in defense – Insights from Check Point’s Latest Security Report

Key Takeaways: ·        Rising Threats: Cybersecurity landscape faces an unprecedented surge in ransomware attacks, with 1 in every 10 organizations globally being targeted in 2023. ·        Evolution of Tactics: Adversaries exploit zero-day vulnerabilities, employ disruptive wipers, utlise emerging RaaS (Ransomware-as-a-Service)…

Hybrid Mesh and the Check Point Infinity Platform

Gartner has recently recognized Check Point as a Representative Vendor for Hybrid Mesh Firewall Platforms (“Hybrid Mesh”). This blog explores what hybrid mesh is and how the Check Point Infinity Platform delivers on the promise of a cyber security strategy…

Quebec Law 25: All You Need to Know

Quebec Law 25 regulates how companies operating in Quebec manage people’s data. Read here on the law’s key requirements and how to comply. The post Quebec Law 25: All You Need to Know appeared first on Scytale. The post Quebec…