This Week in Security: Cookie Monster, CyberGhost, NEXX, and Dead Angles

“Operation Cookie Monster” ranks as one of the best code names in recent memory. And it’s apropo, given what exactly went down. Genesis Market was one of those marketplaces where …read more Continue reading This Week in Security: Cookie Monster, CyberGhost, NEXX, and Dead Angles

What your SOC will be facing in 2023

Supply chain and reoccurring attacks, data destruction, lack of staff — what challenges will your security operations center be facing in 2023? Continue reading What your SOC will be facing in 2023

4 Most Common Cyberattack Patterns from 2022

As 2022 comes to an end, cybersecurity teams globally are taking the opportunity to reflect on the past 12 months and draw whatever conclusions and insights they can about the threat landscape. It has been a challenging year for security teams. A major conflict in Europe, a persistently remote workforce and a series of large-scale […]

The post 4 Most Common Cyberattack Patterns from 2022 appeared first on Security Intelligence.

Continue reading 4 Most Common Cyberattack Patterns from 2022

Advanced threat predictions for 2023

We polled our experts from the GReAT team and have gathered a small number of key insights about what APT actors are likely to focus on in 2023. Continue reading Advanced threat predictions for 2023

Cybersecurity threats: what awaits us in 2023?

We invited notable experts to share their insights and unbiased opinions on what we should expect from cybersecurity in the following year. Continue reading Cybersecurity threats: what awaits us in 2023?

How Cybersecurity Policy Has Changed Since the SolarWinds Attack

Major cyberattacks since 2019 jolted the U.S. government and software industry into action. The succeeding years have seen executive orders, new funding, two summits and a newfound resolve. Because of those attacks, the federal government aims to fix the open-source software security threat altogether. But what has really come of these efforts in the last […]

The post How Cybersecurity Policy Has Changed Since the SolarWinds Attack appeared first on Security Intelligence.

Continue reading How Cybersecurity Policy Has Changed Since the SolarWinds Attack

62% of Surveyed Organizations Hit By Supply Chain Attacks in 2021

You’ve heard more about the supply chain in the past two years than you ever expected, or likely wanted. But, as a cybersecurity professional, you now have even more reason to pay attention besides not being able to get your favorite products at the grocery store. The apps used to develop software and run the […]

The post 62% of Surveyed Organizations Hit By Supply Chain Attacks in 2021 appeared first on Security Intelligence.

Continue reading 62% of Surveyed Organizations Hit By Supply Chain Attacks in 2021

Ransomware Resilience Tops Findings in X-Force Threat Intelligence Index 2022

For the third year in a row, ransomware was the top attack type globally in 2021, despite some successes last year by law enforcement to take down ransomware groups. This was among the top findings of IBM Security’s latest research published in the tenth annual X-Force Threat Intelligence Index, a comprehensive overview of the global […]

The post Ransomware Resilience Tops Findings in X-Force Threat Intelligence Index 2022 appeared first on Security Intelligence.

Continue reading Ransomware Resilience Tops Findings in X-Force Threat Intelligence Index 2022

Zhengbang Pick & Places Your Confidential Data In The Bag, Slowly

A Zhengbang Pick&Place machine, with a Virustotal 53/69 result and "53 security vendors and 1 sandbox flagged this file as mailcious" crudely overlaid on top of the image

Isn’t it convenient when your pick-and-place machine arrives with a fully-set-up computer inside of it? Plug in a keyboard, mouse and a monitor, and you have a production line ready …read more Continue reading Zhengbang Pick & Places Your Confidential Data In The Bag, Slowly

Cyber Awareness 2022: Consider Deepfakes, NFTs and More

From deepfakes to crypto crime to in-flight drone-based data theft, cyber awareness in 2022 will look a bit different. Good cyber awareness means knowing these risks, even if some of them sound stranger than science fiction.  Cyber Awareness and Deepfake Crime What if you got a phone call from a trusted friend or colleague to […]

The post Cyber Awareness 2022: Consider Deepfakes, NFTs and More appeared first on Security Intelligence.

Continue reading Cyber Awareness 2022: Consider Deepfakes, NFTs and More