Sekoia: Latest in the Financial Sector Cyber Threat Landscape

Phishing, infostealer malware, ransomware, supply chain attacks, data breaches and crypto-related attacks are among the top evolving threats in the financial sector, says Sekoia.

Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks

A November report from Google Cloud details possible nation-state malware tactics in 2024 and new angles of cyberattacks.

By |2023-11-09T15:52:19+00:00November 9, 2023|Artificial Intelligence, Big Data, chronicle security operations, cloud security, CXO, cyberespionage, cybersecurity, Developer, generative ai, google cloud, hybrid cloud, International, malware, Mandiant, multicloud, phishing, Security, social engineering, Uncategorized, virustotal|Comments Off on Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks

New SecuriDropper Malware Bypasses Android 13 Restrictions, Disguised as Legitimate Applications

A new malware is bypassing an Android 13 security measure that restricts permissions to apps downloaded out of the legitimate Google Play Store.

By |2023-11-08T16:11:27+00:00November 8, 2023|Android, android 13, chrome browser, cybersecurity, fraud, Google, google play, malware, mobile security, phishing, Security, Software, trojan, Uncategorized|Comments Off on New SecuriDropper Malware Bypasses Android 13 Restrictions, Disguised as Legitimate Applications

Generative AI Can Write Phishing Emails, But Humans Are Better At It, IBM X-Force Finds

Hacker Stephanie "Snow" Carruthers and her team found phishing emails written by security researchers saw a 3% better click rate than phishing emails written by ChatGPT.

By |2023-10-24T11:00:07+00:00October 24, 2023|Artificial Intelligence, chatgpt, generative artificial intelligence, ibm, ibm threat intelligence, ibm x-force, International, Open source, phishing, Security, Uncategorized, wormgpt|Comments Off on Generative AI Can Write Phishing Emails, But Humans Are Better At It, IBM X-Force Finds

New Netskope Report Exposes Increasing Use of Cloud Apps to Spread Malware

Microsoft OneDrive accounts for 26% of the overall usage of cloud storage apps to host malware, ahead of Microsoft PowerPoint and GitHub.

By |2023-10-17T20:14:06+00:00October 17, 2023|Australia, Cloud, cloud apps security, cloud security, cloud storage, cloud storage apps, cybercrime, cybersecurity, International, malware, Microsoft, microsoft onedrive, phishing, Security, spearphishing, Storage, Uncategorized|Comments Off on New Netskope Report Exposes Increasing Use of Cloud Apps to Spread Malware

New CISA and NSA Identity and Access Management Guidance Puts Vendors on Notice

This CISA-NSA guidance reveals concerning gaps and deficits in the multifactor authentication and Single Sign-On industry and calls for vendors to make investments and take additional steps.

By |2023-10-16T21:26:59+00:00October 16, 2023|CXO, cybersecurity, Developer, governance, hardware security models, identity and access management, multifactor authentication, phishing, Security, single sign-on, Uncategorized|Comments Off on New CISA and NSA Identity and Access Management Guidance Puts Vendors on Notice

New EvilProxy Phishing Attack Uses Indeed.com Redirector to Target US Executives

Microsoft, the Dark Web and the name John Malkovich all factor into this EvilProxy phishing attack. The good news is there are steps IT can take to mitigate this security threat.

By |2023-10-07T01:25:58+00:00October 7, 2023|CXO, cybersecurity, dark web, Microsoft, phishing, Security, Uncategorized|Comments Off on New EvilProxy Phishing Attack Uses Indeed.com Redirector to Target US Executives

Abnormal Security: Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

A new study found that 4.31% of phishing attacks mimicked Microsoft, far ahead of the second most-spoofed brand PayPal.

By |2023-08-29T16:07:06+00:00August 29, 2023|ai, Artificial Intelligence, BEC, chatgpt, check point, Cloud, cybersecurity, email, generative ai, International, it, IT Policies, Microsoft, Microsoft 365, network+, Networking, Open source, paypal, phishing, Security, social engineering, Software, Uncategorized|Comments Off on Abnormal Security: Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits
Go to Top