Four editors at Information Security Media Group discuss highlights from ISMG's recent London Summit, including whether if collateral damage from the Russia-Ukraine war isn't necessarily all it was reputed to be, then what are the most concerning emerging threats; building a cyber risk playbook to help businesses...
Since at least the middle of last year, online attackers have been increasingly targeting the financial services sector.
So warns John Fokker, principal engineer and head of cyber investigations for the Advanced Threat Research group at cybersecurity firm Trellix. He says Trellix's latest threat assessment found a...
New CEO Bryan Ware plans to leverage LookingGlass' nascent attack surface management capabilities to capture clients in verticals such as pharmaceuticals, manufacturing and utilities. The company tapped former CISA leader Ware to serve as its next CEO following the acquisition of Next5.
Researchers have observed China-based, government-sponsored threat actors collecting intelligence by targeting Russian government officials with an updated variant of a remote access Trojan known as PlugX. And Microsoft shares a detailed report about Russian cyberattacks observed against Ukraine.
Threat intelligence is increasingly recognized as an important weapon of an organization's defense strategy. Understanding who is targeting your enterprise, their motivations and capabilities is required to predict the threat actor's next move.
The continual tracking and interpreting of large amounts of dispersed...
In the latest weekly update, editors at Information Security Media Group discuss important cybersecurity issues, including the White House warning about escalated cyberthreats from Russia, the impact of the Russia-Ukraine war on the healthcare sector and why combating SIM swap fraud remains challenging.
Online attackers are increasingly targeting the financial services sector. John Fokker, head of cyber investigations at Trellix, says his firm has charted a 22% quarterly increase in ransomware attacks on financial services, and APT detections have risen by 37%. Here's how the industry must respond.
In this interview with Information Security Media Group, Tony Richards, Office of the CISO, Google Cloud, and Tim Erridge, Vice President of Services, Unit 42 Palo Alto Networks, discuss how security leaders can strengthen their threat intelligence programs to successfully preempt future attacks.
IT officials from Ukraine continue to call out alleged Russian cyberattacks. This comes as hacktivists have taken matters into their own hands in the digital underground. Also: NATO pledges additional cyber support, while President Joe Biden urges U.S. governors to bolster defenses.
If Russia uses hack attacks to support its invasion, would Western governments want to immediately attribute those attacks or disruptions? Enter a Thursday alert from the U.S. government warning that it is "aware of possible threats to U.S. and international satellite communication networks."
In their Security Operations Primer, Gartner has recently identified Attack Surface Management as one of the top security trends and priorities for 2022. In this webinar you will learn how to address this problem by combining ASM, Vulnerability Management and Threat Intelligence into a single solution.
Join us...
In their Security Operations Primer, Gartner has recently identified Attack Surface Management as one of the top security trends and priorities for 2022. In this webinar you will learn how to address this problem by combining ASM, Vulnerability Management and Threat Intelligence into a single solution.
Join us...
In Q4 2021, Kroll observed a 356% increase in common vulnerabilities and exposures
(CVEs) or zero-day vulnerabilities being exploited for initial access when compared to
Q3 2021.
With 2021 being a record year for vulnerabilities, these findings underscore the risk to organizations in the wake of...
'Despite an arsenal of point products designed to block malware and threats and warn of vulnerabilities that can be exploited by attackers; it is no longer sufficient to rely on traditional defence techniques. While effective in some areas, these approaches are limited, with one of the most important gaps being the...
Insider risk and data loss prevention (DLP) are a top concern for organisations today. And it makes sense, with a distributed workforce and increasing reliance on technology, legacy, on-prem DLP technology hasn’t lived up to its promises.
That’s because data loss begins with people, whether careless, compromised...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.