BECs double in 2022, overtaking ransomware

A look at 4th quarter 2022, data suggests that new threat surfaces notwithstanding, low-code cybersecurity business email compromises including phishing, as well as MFA bombing are still the prevalent exploits favored by threat actors. The post BECs do...

By |2023-03-20T18:43:58+00:00March 20, 2023|business email compromise, Cloud, cloud security, cybersecurity, phishing, ransomware, Security, Uncategorized|Comments Off on BECs double in 2022, overtaking ransomware

First Dero cryptojacking campaign targets unprotected Kubernetes instances

Learn how this cryptocurrency campaign operates and its scope. Then, get tips on protecting vulnerable Kubernetes instances from this cybersecurity threat. The post First Dero cryptojacking campaign targets unprotected Kubernetes instances appeared fir...

By |2023-03-20T12:20:30+00:00March 20, 2023|blockchain, Cloud, cryptocurrency, cryptojacking, cybersecurity, dero, docker, Innovation, kubernetes, monero, Networking, Security, Uncategorized|Comments Off on First Dero cryptojacking campaign targets unprotected Kubernetes instances

How to prevent data theft by existing and departing employees

Some 12% of employees take customer details, health records, sales contracts and other confidential data when leaving a company, according to DTEX. The post How to prevent data theft by existing and departing employees appeared first on TechRepublic.

By |2023-03-17T18:01:09+00:00March 17, 2023|access management, credential theft, CXO, cybersecurity, data risks, data theft, insider threats, Security, Uncategorized, zero trust|Comments Off on How to prevent data theft by existing and departing employees

The Biden administration may eye CSPs to improve security, but the real caveat emptor? Secure thyself

While the administration may look to strengthen security against cyberattackers for cloud providers, like Amazon, Microsoft and Google, experts say the onus is on the customer. The post The Biden administration may eye CSPs to improve security, but the...

By |2023-03-16T20:37:12+00:00March 16, 2023|Amazon, AWS, Cloud, cloud security, cloud security policy, cloud service provider, cloud threats, cybersecurity, Google, Microsoft, Security, Uncategorized|Comments Off on The Biden administration may eye CSPs to improve security, but the real caveat emptor? Secure thyself

Humans are still better at creating phishing emails than AI — for now

AI-generated phishing emails, including ones created by ChatGPT, present a potential new threat for security professionals, says Hoxhunt. The post Humans are still better at creating phishing emails than AI — for now appeared first on TechRepublic.

By |2023-03-15T20:57:25+00:00March 15, 2023|Artificial Intelligence, chatgpt, CXO, cybersecurity, Innovation, phishing, Security, Uncategorized|Comments Off on Humans are still better at creating phishing emails than AI — for now

Learn the basics of cybersecurity with this $60 web-based training package

The Premium Ethical Hacking Certification Bundle features eight courses that introduce students to the fundamentals and prepare them to earn important credentials from CompTIA. The post Learn the basics of cybersecurity with this $60 web-based training...

By |2023-03-14T20:35:25+00:00March 14, 2023|cybersecurity, cybersecurity training, ethical hacking bundle, Security, Uncategorized|Comments Off on Learn the basics of cybersecurity with this $60 web-based training package

Attack campaign on edge appliance: undetected since 2021 and resists firmware update

A possible Chinese attack campaign on compromised unpatched SonicWall SMA edge devices stayed undetected since 2021 and could persist even through firmware updates. The post Attack campaign on edge appliance: undetected since 2021 and resists firmware ...

By |2023-03-14T20:25:29+00:00March 14, 2023|cybersecurity, Edge, edge devices, Security, sonicwall, Uncategorized|Comments Off on Attack campaign on edge appliance: undetected since 2021 and resists firmware update

How internet-facing webcams could put your organization at risk

By exploiting webcams and other IoT devices, hackers can spy on private and professional conversations, potentially giving them access to sensitive information, says BitSight. The post How internet-facing webcams could put your organization at risk app...

By |2023-03-13T19:24:15+00:00March 13, 2023|CXO, cybersecurity, cybersecurity risk prevention, hacking, Internet of Things, iot, Security, Uncategorized, webcams|Comments Off on How internet-facing webcams could put your organization at risk

SYS01 stealer targets Facebook business accounts and browser credentials

The SYS01 infection chain uses DLL sideloading to steal information. Learn how to protect your business from this cybersecurity threat. The post SYS01 stealer targets Facebook business accounts and browser credentials appeared first on TechRepublic.

By |2023-03-13T19:11:12+00:00March 13, 2023|chromium, credential theft, cybersecurity, data theft, dll sideloading, facebook, malware, Security, Uncategorized|Comments Off on SYS01 stealer targets Facebook business accounts and browser credentials
Go to Top