Category: www.infosecurity-magazine.com

Okta Warns Customers of Credential Stuffing Barrage

Okta has issued customers with new advice on how to block mounting credential stuffing attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: Okta Warns Customers of Credential Stuffing Barrage

Over 850 Vulnerable Devices Secured Through CISA Ransomware Program

CISA’s RVWP program sent 1754 ransomware vulnerability notifications to government and critical infrastructure entities in 2023, leading to 852 devices being secured This article has been indexed from www.infosecurity-magazine.com Read the original article: Over 850 Vulnerable Devices Secured Through CISA…

DragonForce Ransomware Group Uses LockBit’s Leaked Builder

Cyber threat intelligence provider Cyble found that DragonForce was using a ransomware binary based on LockBit Black’s builder This article has been indexed from www.infosecurity-magazine.com Read the original article: DragonForce Ransomware Group Uses LockBit’s Leaked Builder

11% of Cybersecurity Teams Have Zero Women

A new ISC2 study highlights the lack of diversity in cybersecurity with only 4% of teams having a majority of women, while 11% have none at all This article has been indexed from www.infosecurity-magazine.com Read the original article: 11% of…

BEC and Fund Transfer Fraud Top Insurance Claims

Email-borne fraud accounted for more insurance claims than any other category in 2023, says Coalition This article has been indexed from www.infosecurity-magazine.com Read the original article: BEC and Fund Transfer Fraud Top Insurance Claims

US Congress Passes Bill to Ban TikTok

The bill that could see TikTok banned in the US has been approved by the House of Representatives and the Senate This article has been indexed from www.infosecurity-magazine.com Read the original article: US Congress Passes Bill to Ban TikTok

Fifth of CISOs Admit Staff Leaked Data Via GenAI

One in five UK organizations have had corporate data exposed via generative AI, says RiverSafe This article has been indexed from www.infosecurity-magazine.com Read the original article: Fifth of CISOs Admit Staff Leaked Data Via GenAI

Vulnerability Exploitation on the Rise as Attackers Ditch Phishing

Mandiant’s latest M-Trends report found that vulnerability exploitation was the most common initial infection vector in 2023, making up 38% of intrusions This article has been indexed from www.infosecurity-magazine.com Read the original article: Vulnerability Exploitation on the Rise as Attackers…