Displaying items by tag: Threat actors

Cybersecurity company Bitdefender has issued a warning on an active campaign by the North Korea-linked Lazarus Group, targeting organisations by capturing credentials and delivering malware through fake LinkedIn job offers.

Published in Security

GUEST OPINION by Rapid7 Senior Director, Threat Analytics, Christiaan Beek: The ransomware landscape in 2024 continued to evolve at a rapid pace, outgrowing many of the trends we saw in 2023.

Published in Security

GUEST INTERVIEW: Sumit Bansal, BlueVoyant's Head of APJ, talks to iTWire about how it helps CISOs and CIOs protect their company, assets and brand reputation from internal and external threats.

Published in Guest Interviews

Australia remains amongst top country rankings for malware detection according to a new report from one global cybersecurity firm which also revealed a global 10% annual increase in total threats blocked in 2023.

Published in Security

Cybersecurity solutions provider Bitdefender Labs says it has been monitoring the growing trend among cybercriminals who actively exploit social media networks for malvertising, and the “end goal of these attacks” is to hijack accounts and “steal personal data” through malicious software.

Published in Security

New report reveals threat actors are diversifying their tactics to bypass defensive controls

There has been a 40 percent increase globally in cyberattacks targeting government agencies and the public services sector, according to one intelligent security software and services company.

Published in Security

GUEST OPINION: According to the Exabeam State of the SIEM survey, security professionals remain confident in the face of modernising adversaries despite rising breach numbers. The survey revealed that 97% of security professionals feel assured that they are well-equipped with the tools and processes they need to prevent and detect intrusions or breaches. However, according to other recent security industry reports, 83% of organisations experienced more than one data breach in 2022.

Published in Guest Opinion

Automated cybersecurity firm Forescout ’ Vedere Labs has unveiled research into the riskiest IT, IoT, OT and IoMT devices across enterprise networks, including what it says uncovers what makes the devices so risky and how to mitigate cyber risks affiliated with them.

Published in Security
Thursday, 01 September 2022 10:45

3 Pillars to software supply chain security

GUEST OPINION: Software supply chain attacks have accelerated in recent years, aiming to hit organisations’ developer environments.

Published in Guest Opinion

Nearly one-third of organisations have suffered a ransomware attack enabled by a malicious insider, a threat seen as commonly as the accidental insider (35%), according to a new report from cloud visibility and analytics company Gigamon.

Published in Security

Cyber criminals pivoted to unconventional people-focused attack methods last year, including 100,000 daily smartphone attacks and double the amount of smishing (phishing cybersecurity attacks over mobile text messaging) attempts year-over-year, according to cybersecurity firm Proofpoint’s latest The Human Factor report.

Published in Security

GUEST OPINION: Most organisations are focused on immediate priorities, and have a short planning horizon for cyber. Cyber doesn’t seem as immediate as the need to meet targets, respond to Freedom Of Information, or complete reporting cycles. Anything that disrupts core business is seen as too high a price to pay.

Published in Guest Opinion

BlackBerry’s Research and Intelligence has released its "Old Dogs New Tricks" research paper which examines how threat actors are sneakily leveraging new and uncommon programming languages to evade detection and hinder threat analysis.

Published in Security

A survey by an anonymous security researcher, who goes by the handle Bank Security on Twitter, has found that the US is the top nation when it comes to accessing the main Russian underground communities on the dark web.

Published in Security

Subscribe to Newsletter

*  Enter the security code shown: img0

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments