Tag: EN

How to Steer AI Adoption: A CISO Guide

CISOs are finding themselves more involved in AI teams, often leading the cross-functional effort and AI strategy. But there aren’t many resources to guide them on what their role should look like or what they should bring to these meetings. …

North Korea-linked APT Emerald Sleet is using a new tactic

Microsoft Threat Intelligence has observed North Korea-linked APT Emerald Sleet using a new tactic, tricking targets into running PowerShell. Microsoft Threat Intelligence researchers spotted North Korea-linked threat actor Emerald Sleet (also known as Kimsuky and VELVET CHOLLIMA) using a new…

2025 — Key Predictions Shaping the Public Sector

2025 Public Sector predictions review cybersecurity in the new administration, with AI dominating headlines and expectations of cyber espionage. The post 2025 — Key Predictions Shaping the Public Sector appeared first on Palo Alto Networks Blog. This article has been…

Holding the Tide Against the Next Wave of Phishing Scams

By now, we should all be pretty well acquainted with phishing scams. They’ve been around for a very long time—nearly 30 years, in fact—and are the primary focus of most security awareness training programs and initiatives. Despite this, phishing remains…

Delivering Malware Through Abandoned Amazon S3 Buckets

Here’s a supply-chain attack just waiting to happen. A group of researchers searched for, and then registered, abandoned Amazon S3 buckets for about $400. These buckets contained software libraries that are still used. Presumably the projects don’t realize that they…

A Guide to Mitigating Holiday Cyber Risks

The holiday surge in online activity, driven by eager consumers seeking the best deals, often creates a smokescreen for sophisticated threats that can lead to substantial financial losses, reputational damage, and even account takeovers.  For consumers, this increased online activity…