Predator spyware endures even after widespread exposure, analysis shows

The operators of the Predator spyware rebuilt their infrastructure and operate in at least 11 countries after being exposed last year.

The post Predator spyware endures even after widespread exposure, analysis shows appeared first on CyberScoop.

Continue reading Predator spyware endures even after widespread exposure, analysis shows

Ivanti integrity checker tool needs latest update to work, Five Eyes alert warns

The software company pushed back on the joint advisory, which comes following multiple directives from CISA this year prodding agencies to patch against Ivanti exploits.

The post Ivanti integrity checker tool needs latest update to work, Five Eyes alert warns appeared first on CyberScoop.

Continue reading Ivanti integrity checker tool needs latest update to work, Five Eyes alert warns

Iran hacking group impersonates defense firms, hostage campaigners

A hacking campaign linked to the Islamic Revolutionary Guard Corps is targeting firms in the defense sector with a pair of new backdoors.

The post Iran hacking group impersonates defense firms, hostage campaigners appeared first on CyberScoop.

Continue reading Iran hacking group impersonates defense firms, hostage campaigners

Unmanaged third-party access threatens OT environments

Many industrial organizations lack the resources, expertise, and collaborative processes to effectively mitigate threats and ensure secure access to operational technology (OT) systems, according to Cyolo. Ensuring secure access to OT environments is a… Continue reading Unmanaged third-party access threatens OT environments

It’s time for security operations to ditch Excel

Security teams are hiding an embarrassing secret from the outside world: despite their position at the vanguard of technology, security risks and threats, their actual war plans are managed on spreadsheets. This is a far cry from the dark rooms, multi-… Continue reading It’s time for security operations to ditch Excel

MSPs undergo transformation in response to persistent cyber threats

2Organizations are increasingly turning to Managed Service Providers (MSPs) to alleviate pressure on IT departments, according to SonicWall. Managed services have emerged as a game-changing solution, providing organizations with an additional human-lay… Continue reading MSPs undergo transformation in response to persistent cyber threats

The importance of a good API security strategy

In 2024, API requests accounted for 57% of dynamic internet traffic around the globe, according to the Cloudflare 2024 API Security & Management Report, confirming that APIs are a crucial component of modern software development. But with their in… Continue reading The importance of a good API security strategy

Report: Manufacturing bears the brunt of industrial ransomware

The ransomware variant LockBit is responsible for 25% of ransomware incidents affecting industrial systems tracked by cybersecurity firm Dragos.

The post Report: Manufacturing bears the brunt of industrial ransomware appeared first on CyberScoop.

Continue reading Report: Manufacturing bears the brunt of industrial ransomware