Asia-Pacific Ransomware Threats Depend on Country and Sector, Says Rapid7

Cyber security operatives have been warned to look at the specific ransomware threats facing their country and industry, while closing down common pathways being used by skilled access brokers. Continue reading Asia-Pacific Ransomware Threats Depend on Country and Sector, Says Rapid7

Securities and Exchange Commission Cyber Disclosure Rules: How to Prepare for December Deadlines

Starting Dec. 18, publicly traded companies will need to report material cyber threats to the SEC. Deloitte offers business leaders tips on how to prepare for these new SEC rules. Continue reading Securities and Exchange Commission Cyber Disclosure Rules: How to Prepare for December Deadlines

Microsoft warns of Volt Typhoon, latest salvo in global cyberwar

Microsoft published specifics on the Volt Typhoon state-aligned China actor. Experts say raising awareness of threats is critical.
The post Microsoft warns of Volt Typhoon, latest salvo in global cyberwar appeared first on TechRepublic.
Continue reading Microsoft warns of Volt Typhoon, latest salvo in global cyberwar

White House addresses AI’s risks and rewards as security experts voice concerns about malicious use

The Biden administration, last week, articulated aims to put guardrails around generative and other AI, while attackers get bolder using the technology.
The post White House addresses AI’s risks and rewards as security experts voice concerns abou… Continue reading White House addresses AI’s risks and rewards as security experts voice concerns about malicious use

Ransomware attacks skyrocket as threat actors double down on U.S., global attacks

New studies by NCC Group and Barracuda Networks show threat actors are increasing ransomware exploits, with consumer goods and services receiving the brunt of attacks and a large percentage of victims being hit multiple times.
The post Ransomware attac… Continue reading Ransomware attacks skyrocket as threat actors double down on U.S., global attacks

Malicious Reconnaissance: What It Is and How To Stop It

You spend your days getting ready to stop threat actors. But even as you wonder, attackers could already be ‘casing the joint’.  Before any well-organized attack, skillful or professional attackers quietly snoop around, looking for chances to gain access. It’s called malicious reconnaissance — the unauthorized active monitoring or probing of any information system to […]

The post Malicious Reconnaissance: What It Is and How To Stop It appeared first on Security Intelligence.

Continue reading Malicious Reconnaissance: What It Is and How To Stop It

It’s Not Fair, But Cyber Crime Is Cheap

It may not be fair, but cyber crime is cheap. How cheap? You can buy ransomware for as little as $66, or hire a threat actor for $250. And if you look hard enough, you can even get a phishing kit for free on underground forums. Although these illicit methods may not be expensive, the […]

The post It’s Not Fair, But Cyber Crime Is Cheap appeared first on Security Intelligence.

Continue reading It’s Not Fair, But Cyber Crime Is Cheap

CISO Stories Podcast: So You Want to be a Cyber Spy?

Ira Winkler, CISO at Skyline Technology Solutions, recounts his amazing journey from wannabe astronaut to NSA intelligence analyst, social engineer, systems hacker and author, and some of the crazy things that happened along the way – check it out… Continue reading CISO Stories Podcast: So You Want to be a Cyber Spy?

Malicious Life Podcast: China’s Unrestricted Cyberwarfare Part 3

For more than a decade, China orchestrated a sophisticated espionage campaign against Nortel Networks, using Huawei, Chinese civilians working in Canada, and even organized crime gangs to steal important technical and operational information. When… Continue reading Malicious Life Podcast: China’s Unrestricted Cyberwarfare Part 3