-
Top 10 Malware Q4 2023
The Top 10 Malware in Q4 2023 changed slightly from the previous quarter. Here’s what the CIS Cyber Threat Intelligence team observed. Read More
-
Half of IT Leaders Identify IoT as Security Weak Point
The Viakoo study also said 50% firms faced IoT cyber incidents in past year, 44% of which were severe Read More
-
Most Commercial Code Contains High-Risk Open Source Bugs
Synopsys report reveals 74% of codebases now contain risky open source components Read More
-
China Surveillance Company Hacked
Last week, someone posted something like 570 files, images and chat logs from a Chinese company called I-Soon. I-Soon sells hacking and espionage services to Chinese national and local government. Lots of details in the news articles. These aren’t details about the tools or techniques, more the inner workings of the company. And they seem…
-
69% of Organizations Infected by Ransomware in 2023
Proofpoint found that 69% of organizations experienced a successful ransomware incident in the past year, with 60% hit on four or more occasions Read More
-
The endpoint evolution – Evolving from traditional endpoints to cloud or containerized workloads and the security solutions to protect them
As organizations grow and more endpoints are added across the enterprise, they create an increasingly broad attack surface sophisticated attackers are looking to compromise. According to the 2019 Endpoint Security Trends Report 70% of breaches originate at the endpoint¹. That is likely because endpoints typically represent the Intersection between humans and machines creating vulnerable points…
-
Business Logic Abuse Dominates as API Attacks Surge
Imperva finds attacks targeting API business logic increased to 27% in 2023 Read More
-
Booking.com refund request? It might be an Agent Tesla malware attack
Always be wary of opening unsolicited attachments – they might harbour malware. That’s a message that is being strongly underlined once again, following the discovery of a cybercrime campaign that is sending out poisoned PDF files – pretending they are associated with hotel reservations. Read More
-
White House Urges Tech Industry to Eliminate Memory Safety Vulnerabilities
A new White House report has urged software and hardware developers to adopt memory safe programming languages, and eliminate one of the most pervasive classes of bugs Read More
-
CISA Issues Alert on APT29’s Cloud Infiltration Tactics
Known as Midnight Blizzard, the Dukes or Cozy Bear, the group has been identified as a Russian entity likely operating under the SVR Read More