Category: EN

Corporate users getting tricked into downloading AnyDesk

Hackers are leveraging the AnyDesk remote desktop application in a phishing campaign targeting employees, Malwarebytes warns. The AnyDesk phishing campaign In a phishing campaign recently discovered by Malwarebytes researchers, attackers targeted potential victims via email or SMS, personalized to match…

Patch Tuesday Update – February 2024

The post Patch Tuesday Update – February 2024 appeared first on Digital Defense. The post Patch Tuesday Update – February 2024 appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Patch Tuesday…

Cybersecurity Audits: Assessing and Improving Security Posture

Discover how cybersecurity audits can help organizations improve their security posture and protect against evolving cyber threats. The post Cybersecurity Audits: Assessing and Improving Security Posture appeared first on Security Zap. This article has been indexed from Security Zap Read…

Phishing Threats: Trends and Countermeasures

As technology advances, so do the tactics employed by cybercriminals to deceive and exploit unsuspecting individuals and organizations. The post Phishing Threats: Trends and Countermeasures appeared first on Security Zap. This article has been indexed from Security Zap Read the…

How to maintain security across multi cloud environments

Maintaining security across multi-cloud environments requires a comprehensive approach that encompasses various aspects of security. Here are some key steps you can take: 1. Centralized Identity and Access Management (IAM): Implement a centralized IAM solution to manage user identities, roles,…

Rise in cyberwarfare tactics fueled by geopolitical tensions

In this Help Net Security interview, Matt Shelton, Head of Threat Research and Analysis at Google Cloud, discusses the latest Threat Horizons Report, which provides intelligence-derived trends, expertise, and recommendations on threat actors to help inform cloud customer security strategies…

We can’t risk losing staff to alert fatigue

The oft-quoted Chinese military strategist Sun Tzu famously claimed: “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” Exchange “battles” for “cyberattacks”, and the maxim will hold. But too much information…

Cybercriminals get productivity boost with AI

While AI technology has the potential to streamline and automate processes for beneficial outcomes, it also comes with an equal number of risks to data protection, cybersecurity, and other ethical concerns, according to iProov. Digital ecosystems continue to grow and…

How to take control of personal data

Cybercriminals increasingly use open-source intelligence (OSINT) to craft convincing backstories, often by mining social media profiles for details on a target’s profession, interests, and routines. Armed with these personal insights, these malicious actors leverage chatbots to compose highly persuasive messages.…

Threat actors intensify focus on NATO member states

Initial access brokers (IABs) are increasingly targeting entities within NATO member states, indicating a persistent and geographically diverse cyberthreat landscape, according to Flare. IABs infiltrate systems and gain unauthorized access through various techniques, including spear-phishing, exploiting unpatched vulnerabilities, and leveraging…