Will AI threaten the role of human creativity in cyber threat detection?

Cybersecurity requires creativity and thinking outside the box. It’s why more organizations are looking at people with soft skills and coming from outside the tech industry to address the cyber skills gap. As the threat landscape becomes more complex and nation-state actors launch innovative cyberattacks against critical infrastructure, there is a need for cybersecurity professionals […]

The post Will AI threaten the role of human creativity in cyber threat detection? appeared first on Security Intelligence.

Continue reading Will AI threaten the role of human creativity in cyber threat detection?

Thousands of industrial routers vulnerable to command injection flaw 

The vulnerability, found in versions of Four-Faith routers, appears to have been exploited in the wild and has been connected to attempted infections of Mirai.

The post Thousands of industrial routers vulnerable to command injection flaw  appeared first on CyberScoop.

Continue reading Thousands of industrial routers vulnerable to command injection flaw 

Another category? Why we need ITDR

Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in […]

The post Another category? Why we need ITDR appeared first on Security Intelligence.

Continue reading Another category? Why we need ITDR

Strengthening security posture with comprehensive cybersecurity assessments

In this Help Net Security interview, Phani Dasari, CISO at HGS, discusses key aspects of cybersecurity assessments, including effective tools and methodologies, the role of AI and automation, and strategies for aligning assessments with organizational … Continue reading Strengthening security posture with comprehensive cybersecurity assessments

5 reasons to double down on network security

Cybersecurity programs have evolved significantly over the past few decades. The advent of cloud computing shattered the conventional corporate perimeter, forcing organizations to update their defense strategies. Today, with the rise of work-from-anywh… Continue reading 5 reasons to double down on network security

HYPR is latest firm to reveal hiring of fraudulent IT worker overseas

Company officials say the individual was caught during the onboarding process, but used proxies and verified documents to back up their legend.

The post HYPR is latest firm to reveal hiring of fraudulent IT worker overseas appeared first on CyberScoop.

Continue reading HYPR is latest firm to reveal hiring of fraudulent IT worker overseas

HYPR is latest firm to reveal hiring of fraudulent IT worker overseas

Company officials say the individual was caught during the onboarding process, but used proxies and verified documents to back up their legend.

The post HYPR is latest firm to reveal hiring of fraudulent IT worker overseas appeared first on CyberScoop.

Continue reading HYPR is latest firm to reveal hiring of fraudulent IT worker overseas

Enhancing national security: The four pillars of the National Framework for Action

In this Help Net Security interview, John Cohen, Executive Director, Program for Countering Hybrid Threats at the Center for Internet Security, discusses the four pillars of the National Framework for Action, emphasizing how these measures can combat t… Continue reading Enhancing national security: The four pillars of the National Framework for Action

Attackers deploying red teaming tool for EDR evasion

Threat actors are leveraging the open-source EDRSilencer tool to evade endpoint detection and response systems, Trend Micro researchers have noticed. About EDRSilencer The software, which is intended for red teaming, is being abused to “silence&#… Continue reading Attackers deploying red teaming tool for EDR evasion