Cyber Security Firewalls Aren’t Enough to Protect Against Evolving Cyber Threats Jul 7, 2022 cyberdefensemagazine.com By Pat McGarry, CTO, ThreatBlockr The Cybersecurity and Infrastructure Security Agency (CISA) recently added 66 vulnerabilities to its […] The…
Cyber Security Stealthy Cyber-Campaign Ditches Cobalt Strike for Rival ‘Brute Ratel’ Pen Test Tool Jul 7, 2022 darkreading.com The latest criminal use of a legitimate red-teaming tool helps attackers stay under the radar and better access living-off-the-land binaries.
Cyber Security What is Business Email Compromise? Jul 6, 2022 cyberdefensemagazine.com A Guide to CEO Fraud By Shanna Utgard, Senior Cyber Advocate, Defendify “URGENT – Are you available? I […] The…
Cyber Security North Korean State Actors Deploy Surgical Ransomware in Ongoing Cyberattacks on US Healthcare Orgs Jul 6, 2022 darkreading.com US government warns healthcare and public-health organizations to expect continued attacks involving the manually operated "Maui" ransomware.
Cyber Security Apple Debuts Spyware Protection for State-Sponsored Cyberattacks Jul 6, 2022 darkreading.com Apple's new Lockdown Mode protects devices targeted by sophisticated state-sponsored mercenary spyware attacks.
Technology Apple’s new Lockdown Mode defends against government spyware Jul 6, 2022 bleepingcomputer.com Apple announced that a new security feature known as Lockdown Mode will roll out with iOS 16, iPadOS 16, and…
Cyber Security NIST Picks Four Quantum-Resistant Cryptographic Algorithms Jul 5, 2022 darkreading.com The US Department of Commerce's National Institute of Standards and Technology (NIST) announced the first group of encryption tools that…
Cyber Security The Most Common Types of Cyberattacks Plaguing SMBs An How to Protect Against Them Jul 5, 2022 cyberdefensemagazine.com By Richard Clarke, Chief Insurance Officer, Colonial Surety The media landscape is dominated by headlines like this “Hackers […] The…
Technology Microsoft finds Raspberry Robin worm in hundreds of Windows networks Jul 2, 2022 bleepingcomputer.com Microsoft says that a recently spotted Windows worm has been found on the networks of hundreds of organizations from various industry sectors. [...]
Cyber Security Criminals Use Deepfake Videos to Interview for Remote Work Jul 1, 2022 darkreading.com The latest evolution in social engineering could put fraudsters in a position to commit insider threats.
Firewalls Aren’t Enough to Protect Against Evolving Cyber Threats
By Pat McGarry, CTO, ThreatBlockr The Cybersecurity and Infrastructure Security Agency (CISA) recently added 66 vulnerabilities to its […] The…
Stealthy Cyber-Campaign Ditches Cobalt Strike for Rival ‘Brute Ratel’ Pen Test Tool
The latest criminal use of a legitimate red-teaming tool helps attackers stay under the radar and better access living-off-the-land binaries.
What is Business Email Compromise?
A Guide to CEO Fraud By Shanna Utgard, Senior Cyber Advocate, Defendify “URGENT – Are you available? I […] The…
North Korean State Actors Deploy Surgical Ransomware in Ongoing Cyberattacks on US Healthcare Orgs
US government warns healthcare and public-health organizations to expect continued attacks involving the manually operated "Maui" ransomware.
Apple Debuts Spyware Protection for State-Sponsored Cyberattacks
Apple's new Lockdown Mode protects devices targeted by sophisticated state-sponsored mercenary spyware attacks.
Apple’s new Lockdown Mode defends against government spyware
Apple announced that a new security feature known as Lockdown Mode will roll out with iOS 16, iPadOS 16, and…
NIST Picks Four Quantum-Resistant Cryptographic Algorithms
The US Department of Commerce's National Institute of Standards and Technology (NIST) announced the first group of encryption tools that…
The Most Common Types of Cyberattacks Plaguing SMBs An How to Protect Against Them
By Richard Clarke, Chief Insurance Officer, Colonial Surety The media landscape is dominated by headlines like this “Hackers […] The…
Microsoft finds Raspberry Robin worm in hundreds of Windows networks
Microsoft says that a recently spotted Windows worm has been found on the networks of hundreds of organizations from various industry sectors. [...]
Criminals Use Deepfake Videos to Interview for Remote Work
The latest evolution in social engineering could put fraudsters in a position to commit insider threats.