Cybersecurity has become a critical concern for businesses of all sizes. With cyber threats becoming more sophisticated and frequent, the cost of cybersecurity breaches continues to rise dramatically. In fact, the Netwrix 2024 Hybrid Security Trends Report found that 79% of organizations…
Tag: Information Security Buzz
Cyber Attackers Set Their Sights on the Manufacturing Industry
The manufacturing industry has emerged as the most targeted by cyber attacks, accounting for more than 25% of incidents across the top 10 sectors, with 45% of these involving malware. The industry’s appeal to malefactors has grown, largely due to…
Attackers Exploit Roundcube Webmail Vulnerability
Cybersecurity experts from Positive Technologies’ Security Expert Center (PT ESC) have uncovered an exploit targeting Roundcube Webmail, an open-source email client written in PHP. According to the researchers, Roundcube’s “extensive functionality and the convenient access it gives users to email accounts via a browser—without the…
Cyber Attackers Set Their Sights on Manufacturing
The manufacturing industry has emerged as the most targeted by cyber attacks, accounting for more than 25% of incidents across the top 10 sectors, with 45% of these involving malware. The industry’s appeal to malefactors has grown, largely due to…
Google Mandiant: Time-to-Exploit Falls, Zero Day Exploits Rise
A staggering 70% of exploited vulnerabilities in 2023 were leveraged as zero days, meaning threat actors exploited the flaws in attacks before the impacted vendors knew of the bug’s existence or had been able to patch them. In addition, the…
NHS App to Provide Full Medical Records Under Digital Overhaul Plan
The NHS App is set to undergo a major transformation, with plans to make full medical records, test results, and doctor’s letters accessible to patients across England. This initiative is part of a new 10-year strategy aimed at revolutionizing how…
Nearly half (44%) of CISOs Fail to Detect Breaches
A staggering 44% of CISOs were unable to detect a data breach in the last 12 months using existing security tools. Moreover, nearly three-quarters (70%) of CISOs feel their current security tools are ineffective at detecting breaches due to limited…
Fortra Report Reveals Surge in Domain Impersonation, Social Media Attacks, and Dark Web Activity
Fortra’s Q2 2024 report has unveiled a series of concerning trends in the digital threat landscape, analyzing hundreds of thousands of attacks on enterprises, their employees, and brands across domains, social media, counterfeit websites, and the dark web. The findings…
These 7 Practices Are Building Cybersecurity Safeguards in the Construction Industry
Cybersecurity is becoming necessary across multiple industries as they adapt to a technologically driven society. Construction is a perfect example, as most operations a decade ago would consist of human labor. Technological advancements explicitly built for the sector — like…
ConfusedPilot Exposes Vulnerability in AI Systems Used by Major Enterprises
A novel attack, dubbed ConfusedPilot, has been discovered, targeting widely used Retrieval Augmented Generation (RAG)-based AI systems such as Microsoft 365 Copilot. This method allows malicious actors to manipulate AI-generated responses by introducing malicious content into documents referenced by these…
Building Digital Resilience: Insider Insights for a Safer Cyber Landscape
Due to the tremendous feedback we received on our first two articles, which shared invaluable cybersecurity advice from industry experts, we’re excited to continue the series with even more insights. In this third installment, we delve deeper into the theme…
The Battle for Identity Security: Key Insights from the ManageEngine Identity Security Survey 2024
Identity management, particularly privileged identity management, forms the backbone of an effective cybersecurity strategy. The ManageEngine Identity Security Survey 2024 sheds light on the current state of identity management, gathering insights from security decision-makers worldwide. The Importance of Identity Management…
AI Companies Are Not Meeting EU AI Act Standards
Leading artificial intelligence (AI) models are failing to meet key European regulatory standards in areas such as cybersecurity resilience and prevention of discriminatory outputs, according to data obtained by Reuters. The EU AI Act is being implemented in phases over…
Iranian Cyber Actors Compromise Critical Infrastructure Using Brute Force and Credential Access Tactics
Iranian cyber actors are targeting organizations across critical infrastructure sectors, using brute force techniques to obtain user credentials and sell sensitive information on cybercriminal forums. The attacks have affected healthcare, government, information technology, engineering, and energy sectors. This was announced…
Stronger Together: AI and Human Collaboration in the Battle Against Evolving Threats
Sophisticated and complex threats fuel rapid and profound change in the cybersecurity landscape. Malicious actors are exploiting advanced technologies, like artificial intelligence (AI), to launch more targeted, destructive attacks that are harder to detect. As yesterday’s security solutions battle to…
Chinese Researchers Use Quantum Computer to Hack Secure Encryption
In a potentially concerning advancement for global cybersecurity, Chinese researchers have introduced a technique leveraging D-Wave’s quantum annealing systems to breach traditional encryption, which may hasten the timeline for when quantum computers could pose a genuine threat to widely used…
E.U. Court Restricts Meta’s Use of Facebook Data for Targeted Advertising
The Court of Justice for the European Union (CJEU) has ruled that Meta Platforms, the owner of Facebook, must minimize the amount of people’s data it uses for personalized advertising. “An online social network such as Facebook cannot use all…
New Threat Actor Tool EDRSilencer Repurposed for Malicious Use
The Trend Micro Threat Hunting Team has identified an alarming new trend in cyber attacks: malefactors are adopting EDRSilencer, a red team tool designed to interfere with endpoint detection and response (EDR) systems. Originally developed as a tool for security…
Enhance Cyber Resilience to Secure Your Organization
As Cybersecurity Awareness Month unfolds with the continuing theme from 2023, “Secure Our World,” it’s a timely reminder of the importance of taking daily actions to safeguard your organization’s digital ecosystem. In an increasingly interconnected world, where devices, data, and…
TrickMo’s Latest Trick – Stealing PINs and Unlock Patterns
Mobile device and app security firm Zimperium has discovered a new capability in the notorious banking Trojan TrickMo. Some of the samples the company analyzed are able to steal a device’s unlock pattern or PIN. This new feature enables the…