Emerging threat: AI-powered social engineering

Social engineering is a sophisticated form of manipulation but, thanks to AI advancements, malicious groups have gained access to highly sophisticated tools, suggesting that we might be facing more elaborate social engineering attacks in the future. It… Continue reading Emerging threat: AI-powered social engineering

APTs use of lesser-known TTPs are no less of a headache

APT (advanced persistent threat) attacks were once considered to be primarily a problem for large corporations, but the number of these (often state-sponsored) attacks against small- and medium-sized businesses has increased significantly. Everyone is … Continue reading APTs use of lesser-known TTPs are no less of a headache

Staying ahead of the “professionals”: The service-oriented ransomware crime industry

Ransomware has been a hugely profitable industry for criminal gangs for the last few years. The total amount of ransom paid since 2020 is estimated to be at least $2 billion, and this has both motivated and enabled the groups who are profiting from thi… Continue reading Staying ahead of the “professionals”: The service-oriented ransomware crime industry

AI: Interpreting regulation and implementing good practice

Businesses have been using artificial intelligence for years, and while machine learning (ML) models have often been taken from open-source repositories and built into business-specific systems, model provenance and assurance have not always necessaril… Continue reading AI: Interpreting regulation and implementing good practice

WithSecure launches ‘outcome-based’ security at Sphere23 conference

At its Sphere23 event in Finland, security company WithSecure unveiled offerings focused on collaboration, business goals and outcomes.
The post WithSecure launches ‘outcome-based’ security at Sphere23 conference appeared first on TechRepub… Continue reading WithSecure launches ‘outcome-based’ security at Sphere23 conference

WithSecure releases Cloud Security Posture Management to identify insecure cloud configurations

WithSecure has released Cloud Security Posture Management, a new module for its WithSecure Elements security platform, that identifies insecure cloud configurations attackers use to compromise networks. It’s now become commonplace for organizatio… Continue reading WithSecure releases Cloud Security Posture Management to identify insecure cloud configurations

Prevent attackers from using legitimate tools against you

Malicious actors are increasingly exploiting legitimate tools to accomplish their goals, which include disabling security measures, lateral movement, and transferring files. Using commonly available tools allows attackers to evade detection. While cust… Continue reading Prevent attackers from using legitimate tools against you

Outcome-based cybersecurity paves way for organizational goals

Organizations follow a reactive approach to cybersecurity which is stifling their progress in demonstrating value and aligning with business outcomes, according to WithSecure. 83% of respondents surveyed in the study were interested in, planning to ado… Continue reading Outcome-based cybersecurity paves way for organizational goals

Cybersecurity unaligned with business goals is reactive … and flawed: Study

A new report for cybersecurity firm WithSecure suggests that most companies are investing in security solutions that are tactical and reactive, but not in line with strategic aims of an organization.
The post Cybersecurity unaligned with business goals… Continue reading Cybersecurity unaligned with business goals is reactive … and flawed: Study