Organizations are increasingly prioritizing compliance due to recent regulatory requirements, such as those from the US Government regarding the sale of software to the US government and the EU’s Digital Operational Resilience Act (DORA). This was one of the findings…
Tag: Information Security Buzz
Sectigo Debuts Post-Quantum Cryptography Testing Platform with Crypto4A
Sectigo has introduced Sectigo PQC Labs, a testing platform developed in collaboration with Crypto4A, a provider of quantum-safe Hardware Security Modules (HSMs). The platform aims to help companies prepare for the transition to post-quantum cryptography (PQC) by offering a secure…
The Next Y2K? How Past IT Challenges Shape Modern Cybersecurity
The software industry is full of surprises. From development to user experience, it`s a vast avenue of innovations, problem-solving, and security hurdles, driving to create a better and reliable digital landscape for everyone. We spoke with Paul Davis, Field CISO at JFrog,…
The RAT Pack Returns: ValleyRAT’s Devious Delivery Methods
Morphisec Threat Labs has uncovered cunning new delivery techniques used by ValleyRAT, a sophisticated multi-stage malware attributed to the Silver Fox APT. The malware, which primarily targets key roles in finance, accounting, and sales, has evolved with updated tactics, techniques,…
Why Cybersecurity Is Everyone’s Responsibility
For long-time cybersecurity industry veterans, we’re in an age that once we never thought possible; cybersecurity has moved from a backroom, “IT-only” relegation to a top-of-mind business objective. Right where we always thought it should be. However, this new era…
Qualys Report Raises Red Flags in DeepSeek-RI Security
A recent security analysis conducted by Qualys, using its AualysTotalAI solution, has raised significant concerns about DeepSeek-RI’s risks, particularly in enterprise and regulatory settings. The newly released large language model (LLM) has captured global attention with its promise of high…
Credential-stealing malware surges in 2024
Malware designed to steal credentials from password stores now accounts for 25% of all malware activity—a dramatic threefold increase in this type of threat. This was one of the findings of Picus Security’s annual cybersecurity analysis, The Red Report 2025.…
2024: The Year Data Security Took a Beating
2024 was a brutal year for data security, with some of the world’s biggest companies suffering breaches that exposed millions of sensitive records. The attacks were carried out by well-known cybercriminal groups, including Alphv/BlackCat, Qilin, and Rhysida, and shone a…
Upskilling the UK workforce for the AI revolution
As the UK government rolls out its ambitious AI Opportunity Action Plan to enable greater implementation of new technologies to boost economic growth, it faces a critical challenge: ensuring every industry is prepared for this seismic shift. Interestingly, both UK…
Tangerine Turkey: Cryptocurrency Mining Worm Unveiled in Global Campaign
A new threat actor, dubbed Tangerine Turkey by Red Canary’s intelligence team, is attracting attention thanks to its sophisticated use of a Visual Basic Script (VBScript) worm that delivers a crypto mining payload. First seen in November last year, Tangerine…
Smiths Group Discloses Security Breach
Smiths Group, a multinational engineering business, has disclosed a data breach. The company, which is based in London but employees more than 15,000 people in over 50 countries, published a filing to the London Stock Exchange (LSE) on Tuesday saying…
Threat Actors Exploit DeepSeek’s Popularity to Distribute Infostealers on PyPI
Malicious actors have exploited the rising popularity of DeepSeek AI to distribute two malicious infostealer packages through the Python Package Index (PyPI), impersonating legitimate developer tools for the AI platform. Researchers at Positive Technologies discovered and reported the campaign, which…
What is Acceptable Risk?
CISOs today must decide what is an acceptable risk to their organization. It’s an impossible equation to solve as enterprise attack surfaces are rapidly expanding, necessitating the need for a modernized approach to risk assessment. The most forward-thinking CISOs use…
Criminals Increase Attack Speed by 22%
The average time it takes for an attacker to move laterally after gaining initial access – known as breakout time – has plummeted to just 48 minutes, new research from ReliaQuest has revealed. These results represent a 2% increase in…
Forrester Report: The Complexities of Human-Element Breaches
Security leaders often have a narrow view of human-element breaches, thinking of them as either social engineering or human error, but there’s more to it than that. Breaches that start with a person can be divided into broader categories, including…
“Vámonos!” Declares DORA, but 43% of UK Financial Services Say “No”
On January 17TH, 2025, the EU’s Digital Operational Resilience Act (DORA) came into effect. However, a recent survey of 200 UK CISOs from Censuswide found that 43% of the UK financial services industry will miss this compliance deadline despite facing…
DoJ, Dutch Authorities Seize 39 Domains Selling Malicious Tools
The US Department of Justice (DoJ) and the Dutch National Police have seized 39 domains linked to a Pakistan-based cybercrime network operated by a group known as Saim Raza, or HeartSender. The sites sold malicious tools to transnational organized crime…
Regulating AI: Expert Insights on Compliance, Risk, and Security
As artificial intelligence (AI) continues to transform industries, governments worldwide are racing to implement regulations that ensure its safe and ethical use. From the EU AI Act to the White House’s Executive Order 14110 on AI, new frameworks set new…
Looking Back to Look Forward: 2024’s Top Email Threats
In the cybersecurity industry, we tend to look forward. And for good reason: cybersecurity is one of the fastest-moving, most dynamic fields out there. Staying in the fight against cybercriminals relies utterly on not just keeping up with the latest…
Building Resilience Against Zero-Day Threats in Third-Party Risk Management
Global zero-day incidents often reveal the vulnerability of organizations to risks originating from third-party resources. These moments are wake-up calls, highlighting the need for effective third-party risk management (TPRM). However, responding to such events is rarely straightforward. Identifying affected third…