CISA, FBI warns of Chinese-manufactured drones

The new guidance aims to help owners and operators protect themselves against risks.

The post CISA, FBI warns of Chinese-manufactured drones appeared first on CyberScoop.

Continue reading CISA, FBI warns of Chinese-manufactured drones

Government organizations’ readiness in the face of cyber threats

Cyber threats targeting government organizations have become increasingly sophisticated, posing significant risks to national security, public infrastructure, and sensitive data. These threats are diverse in nature, originating from various actors such… Continue reading Government organizations’ readiness in the face of cyber threats

Sandworm probably wasn’t behind Danish critical infrastructure cyberattack, report says

A hacking campaign thought to be attributed to the infamous Russian hacking group may have been the work of a different hacking group, Forescout researchers said in a new report.

The post Sandworm probably wasn’t behind Danish critical infrastructure cyberattack, report says appeared first on CyberScoop.

Continue reading Sandworm probably wasn’t behind Danish critical infrastructure cyberattack, report says

Purple teaming and the role of threat categorization

Organizations constantly work to ensure optimal threat detection and prevention across their systems. One question gets asked repeatedly: “Can we detect the threats we’re supposed to be able to detect?” Red team assessment, penetration testing, and eve… Continue reading Purple teaming and the role of threat categorization

After hack, X claims SEC failed to use two-factor authentication

A breach of the Securities and Exchange Commission’s account on the platform formerly known as Twitter caused bitcoin prices to spike.

The post After hack, X claims SEC failed to use two-factor authentication appeared first on CyberScoop.

Continue reading After hack, X claims SEC failed to use two-factor authentication

The power of basics in 2024’s cybersecurity strategies

In this Help Net Security video, Nick Carroll, Cyber Incident Response Manager at Raytheon, discusses how while organizations will be challenged to strengthen their defenses faster than cyber threats are evolving, this ‘come from behind’ rush to keep p… Continue reading The power of basics in 2024’s cybersecurity strategies

The growing challenge of cyber risk in the age of synthetic media

As AI tools become more widespread, impersonation and deception have become easier. However, organizations are combating this issue with policies and technological solutions. In this Help Net Security video, Mike Bechtel, Chief Futurist at Deloitte, di… Continue reading The growing challenge of cyber risk in the age of synthetic media

How to incorporate human-centric security

Cybersecurity is awash in threat detection and mitigation solutions: SIEM, DLP, SOAR, MDR, EDR, XDR, and more. Threat detection is essential, as it serves to locate and minimize the threat as quickly and effectively as possible. However, some companies… Continue reading How to incorporate human-centric security

A closer look at the manufacturing threat landscape

The manufacturing industry is embracing digital transformation to fuel efficiency and productivity. However, this evolution is accompanied by profound and growing cybersecurity challenges. In this Help Net Security video, Kory Daniels, CISO at Trustwav… Continue reading A closer look at the manufacturing threat landscape

FBI seizes ALPHV leak website. Hours later, ransomware gang claims it ‘unseized’ it

Law enforcement seized the websites of the notorious Russian-speaking group before the criminals say they seized it back.

The post FBI seizes ALPHV leak website. Hours later, ransomware gang claims it ‘unseized’ it appeared first on CyberScoop.

Continue reading FBI seizes ALPHV leak website. Hours later, ransomware gang claims it ‘unseized’ it