Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate

Red Canary’s 2024 Threat Detection Report is based on analysis of almost 60,000 threats across 216 petabytes of telemetry from over 1,000 customers’ endpoints.
The post Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate … Continue reading Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate

SecurityWeek Cyber Insights 2024 Series

Cyber Insights 2024 talks to hundreds of industry experts from dozens of companies covering seven primary topics.
The post SecurityWeek Cyber Insights 2024 Series appeared first on SecurityWeek.
Continue reading SecurityWeek Cyber Insights 2024 Series

State-sponsored hackers know enterprise VPN appliances inside out

Suspected Chinese state-sponsored hackers leveraging Ivanti Connect Secure VPN flaws to breach a variety of organizations have demonstrated “a nuanced understanding of the appliance”, according to Mandiant incident responders and threat hun… Continue reading State-sponsored hackers know enterprise VPN appliances inside out

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements

Open source is a great way to test the waters and define requirements. But when looking at putting a platform into production, an enterprise-ready solution will ensure you can keep up with business demands.
The post From Open Source to Enterprise Ready… Continue reading From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements

Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force

The ransomware threat is declining as actors pivot to infostealing, according to IBM, which says that attacks on cloud services and critical infrastructures are growing.
The post Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-For… Continue reading Ransomware Declines as InfoStealers and AI Threats Gain Ground: IBM X-Force

Audio-jacking: Using generative AI to distort live audio transactions

While the evolution of LLMs mark a new era of AI, we must be mindful that new technologies come with new risks. Explore one such risk called “audio-jacking.”

The post Audio-jacking: Using generative AI to distort live audio transactions appeared first on Security Intelligence.

Continue reading Audio-jacking: Using generative AI to distort live audio transactions

Prioritizing cybercrime intelligence for effective decision-making in cybersecurity

In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will cover a range of essential aspects, from the importance of continuous adaptatio… Continue reading Prioritizing cybercrime intelligence for effective decision-making in cybersecurity

Doppel Secures $14M for AI-Powered Brand Protection Technology

San Francisco startup banks $14 million in Series A funding led by prominent venture capital outfit Andreesen Horowitz (a16z).
The post Doppel Secures $14M for AI-Powered Brand Protection Technology appeared first on SecurityWeek.
Continue reading Doppel Secures $14M for AI-Powered Brand Protection Technology

Embracing offensive cybersecurity tactics for defense against dynamic threats

In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective offensive security operations and their impact on organizational security strategies. What are the critical steps in creatin… Continue reading Embracing offensive cybersecurity tactics for defense against dynamic threats