Cybercriminals picked up the pace on attacks last year

Ransomware groups last year achieved lateral movement within an average of 48 minutes after gaining initial access to targeted environments, threat intelligence experts said.

The post Cybercriminals picked up the pace on attacks last year appeared first on CyberScoop.

Continue reading Cybercriminals picked up the pace on attacks last year

CrowdStrike Security Report: Generative AI Powers Social Engineering Attacks

Trends in cybersecurity across 2024 showed less malware and phishing, though more social engineering. CrowdStrike offers tips on securing your business. Continue reading CrowdStrike Security Report: Generative AI Powers Social Engineering Attacks

It’s not just Salt Typhoon: All China-backed attack groups are showcasing specialized offensive skills

CrowdStrike observed significant growth in China’s offensive cyber capabilities last year as more groups used sector-specific skills to target critical industries and technologies.

The post It’s not just Salt Typhoon: All China-backed attack groups are showcasing specialized offensive skills appeared first on CyberScoop.

Continue reading It’s not just Salt Typhoon: All China-backed attack groups are showcasing specialized offensive skills

A major cybersecurity law is expiring soon — and advocates are prepping to push Congress for renewal 

The 2015 Cybersecurity Information Sharing Act provides vital legal protections for cyber threat sharing initiatives, they say.

The post A major cybersecurity law is expiring soon — and advocates are prepping to push Congress for renewal  appeared first on CyberScoop.

Continue reading A major cybersecurity law is expiring soon — and advocates are prepping to push Congress for renewal 

Why do software vendors have such deep access into customer systems?

To the naked eye, organizations are independent entities trying to make their individual mark on the world. But that was never the reality. Companies rely on other businesses to stay up and running. A grocery store needs its food suppliers; a tech company relies on the business making semiconductors and hardware. No one can go […]

The post Why do software vendors have such deep access into customer systems? appeared first on Security Intelligence.

Continue reading Why do software vendors have such deep access into customer systems?

Job-seeking devs targeted with fake CrowdStrike offer via email

Cryptojackers are impersonating Crowdstrike via email to get developers to unwittingly install the XMRig cryptocurrency miner on their Windows PC, the company has warned. The email Crowdstrike has a web page where job hunters can see which positions ar… Continue reading Job-seeking devs targeted with fake CrowdStrike offer via email

Rounding Up 2024’s Biggest Tech Fails: What Went Wrong This Year?

Explore the biggest tech failures of 2024, from product flops to security breaches, and uncover the lessons that rocked the industry this year. Continue reading Rounding Up 2024’s Biggest Tech Fails: What Went Wrong This Year?