Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How AI Can Help Law Firms Ensure Cybersecurity

Artificial intelligence is now being used in many sectors and can have very positive effects. Routine jobs that people no longer want to deal with are given to artificial intelligence and completed efficiently. One of these sectors can be the cyber security sector. Many companies need to ensure their cyber security, including law firms, and artificial intelligence can help companies in this regard.

BlackBasta Ransomware Gang Uses New Social Engineering Tactics To Target Corporate Networks

ReliaQuest warns that the BlackBasta ransomware gang is using new social engineering tactics to obtain initial access within corporate networks. The threat actor begins by sending mass email spam campaigns targeting employees, then adding people who fall for the emails to Microsoft Teams chats with external users. These external users pose as IT support or help desk staff, and send employees Microsoft Teams messages containing malicious QR codes.

If Social Engineering Is 70% - 90% of Attacks, Why Aren't We Acting Like It?

Over a decade ago, I noticed that social engineering was the primary cause for all malicious hacking. It has been that way since the beginning of computers, but it took me about half of my 36-year career to realize it. At the time, I think everyone in cybersecurity knew social engineering was a big part of why hackers and their malware programs were so successful, but no one really knew how big.

LOTL Attacks-The Silent Saboteurs in Your Systems

Living Off the Land (LOTL) cyber attacks have become a major headache for cybersecurity professionals. These insidious attacks are getting more sophisticated and widespread, posing serious risks to businesses and even national security. Unlike traditional malware-based attacks, LOTL techniques exploit the very tools and processes that organizations rely on for their daily operations.

How to Secure Your Network Infrastructure

With governments across the globe gearing up for major elections, experts have been predicting an increase in distributed denial of service (DDoS) attacks from nation-states and, so far, those predictions have paid off. According to Forbes, a recently thwarted DDoS attack found hackers sending traffic at 3.8 terabytes per second to a target server, peaking at 2.14 billion packets per second, making it the largest DDoS attack ever recorded.

Attack Vector vs Attack Surface

Attack vectors and attack surfaces are both critical concepts in cybersecurity, closely related yet distinct in their roles and implications. Understanding the similarities and differences between them is key to developing robust security strategies. This article will detail what both concepts involve, why they’re crucial, and methods your organization can conduct to enhance its current security posture.

Cross-Site Request Forgery Cheat Sheet

“Aren’t you a little short for a Stormtrooper?” In this iconic Star Wars moment, Princess Leia lazily responds to Luke Skywalker, disguised as one of her Stormtrooper captors and using authentication information to open her cell. In other words, Star Wars acts as an analogy for a cross-site request forgery (CSRF) attack. In a CSRF attack, malicious actors use social engineering so that end-users will give them a way to “hide” in their authenticated session.

Identify the secrets that make your cloud environment more vulnerable to an attack

Compromised secrets, such as leaked API and SSH keys, credentials, and session tokens, are the leading cause of cloud security incidents. While attackers can directly compromise secrets through methods like phishing, they can also gain control by finding and taking advantage of simple misconfigurations in your environment.

75% of Organizations Have Experienced a Deepfake-Related Attack

As generative AI evolves and becomes a mainstream part of cyber attacks, new data reveals that deepfakes are leading the way. Deepfake technology has been around for a number of years, but the AI boom has sparked new attacks, campaigns, and players all trying to use the impersonation technology to rob victims of their credentials, personal details or money. We recently covered multiple deepfake campaigns all perpetrated by a single individual that reached a global level.