Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Stealthy VBA Macro Embedded in PDF-like Header Helps Evade Detection

In the ever-evolving landscape of malware threats, threat actors are continually creating new techniques to bypass detection. A recent discovery by JPCERT/CC sheds light on a new technique that involves embedding a malicious Word document within a seemingly benign PDF file using a.doc file extension.

Get the AT&T Cybersecurity Insights Report: Focus on Manufacturing

We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights Report: Focus on Manufacturing. The report examines the edge ecosystem, surveying manufacturing IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This is the 12th edition of our vendor-neutral and forward-looking report.

Data Breach Costs Rise, But Cybersecurity Pros Still Take Risks

The latest data from IBM shows that the average cost of a data breach has gone up by 2% to a whopping $4.45 million. You would think that in the cybersecurity industry, people would be all about safety and security, right? I mean, it's literally in the name. But here's the kicker: more than half (55%) of cybersecurity professionals have admitted to being risky when it comes to their cybersecurity practices at work.

TikTok Impersonations of Elon Musk Scam Victims of Their Bitcoin

There’s been a surge of Elon Musk-themed cryptocurrency scams on TikTok, BleepingComputer reports. The scammers inform the victims that they can claim their reward after spending a small amount of bitcoin (about $132) to activate their account. “BleepingComputer tested one of the giveaways to see how it works and found that almost all utilize the same template, which pretends to be a crypto investment platform,” BleepingComputer says.

Major Casinos Hacked Using Social Engineering Attacks

Two giants in the gaming and hospitality industry, Caesars Entertainment and MGM Resorts, recently announced that they were targeted by cybercriminals. But here’s the catch, both ransomware attacks appear to have started with the use of social engineering tactics against IT helpdesk personnel to gain access to systems.

Increasing Your Business' Cyber Maturity with Fortra

When building a tower, it helps to start with a sturdy foundation. Cyber maturity is the tower, and there are three levels that build it: Fortra occupies a unique space in the industry because of the sheer size of the security portfolio. It’s one thing to advocate for “single-vendor solutions,” but it’s another when that can pigeonhole you into simply a single solution.

FBI's Most Wanted Cybercriminals in 2023

In an increasingly digitized world, the threat of cybercrime looms larger than ever. The FBI's relentless pursuit of cybercriminals remains a critical defense against this growing menace. We’re well into 2023, and the FBI's Most Wanted Cybercriminals list takes center stage, highlighting the individuals who pose significant threats to our digital security. Join us in exploring their profiles and understanding our vital role in safeguarding the cyber realm.

Data compliance in public sector: Making data secure and accessible isn't mutually exclusive

In the UK, the Information Commissioner’s Office (ICO) has the responsibility of upholding information rights in the public interest. The ICO work with businesses and public sector organisations to offer guidance and best practices for using data and information responsibly, as well as regulating and enforcing relevant laws.

Protect Your Site from Domain Expiration

Nearly every company in the modern era has a website. This site, sometimes called a web application, functions as the information center for the business. Keeping your website active is critical for ensuring that your customers and prospects can access the information they need. Maintaining a website also creates brand presence and strong search engine optimization (SEO), which helps businesses to build trust and credibility in their industry.