In July 2021, the White House established a voluntary initiative for industrial control systems (ICS) to promote cooperation between the critical infrastructure community and the federal government.
In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting newly added coverage for several recently discovered or analyzed ransomware and malware variants, including RagnarLocker ransomware, LokiLocker ransomware, and Humble ransomware, amongst others. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook™ to ensure coverage against these advanced threats.
Each year, the BC Tech Association celebrates the remarkable achievements of the British Columbia technology community through the Technology Impact Awards (TIA). The Gamechanger – Ambition Award, is a testament to a company’s drive to address significant challenges, lead with conviction, and leverage technology to shape a better future.
The Rationale Behind Ethical Phishing Simulation Phishing attacks continue to be a primary vector for cybercriminals seeking unauthorized access to a company’s systems and data. These attacks are becoming increasingly sophisticated, making it crucial for organizations to educate their workforce about the dangers they pose. Ethical phishing tests are designed to mimic real-world phishing scenarios.
What are AI Phishing Attacks? AI phishing attacks, also known as AI-powered phishing or AI-driven phishing, are sophisticated cyberattacks that leverage artificial intelligence and machine learning algorithms to craft and execute highly convincing phishing attempts. These attacks are designed to deceive individuals or employees into divulging sensitive information, such as login credentials, financial details, or personal data. How Do AI Phishing Attacks Work?
OWASP (Open Web Application Security Project) is a nonprofit organization established in 2001 to instruct (guide) website owners and security experts on constructing, purchasing, and maintaining trustworthy and secure software applications. In lay terms, it is a forum where several application security firms and industry specialists provide input to identify the top, most critical security risks that threaten web applications.
New software security data demonstrates that Software Composition Analysis (SCA) will help bolster the safety and integrity of open-source software usage for organizations in the Europe, Middle East, and Africa (EMEA) region in particular. The EU Cyber Resilience Act makes this research especially crucial and timely. Let’s dive in and look at recommendations for EMEA teams wanting to secure cloud-native development.
Innovations in cybersecurity have typically taken hold on the business side before making their way to consumers as controls gained broad acceptance. However, with passwordless multi-factor authentication, or MFA, the script is flipped. Consumers have grown accustomed to logging in to the latest Apple device and web application using biometrics — fingerprint, voice, or facial scanners — instead of typing in passwords that can be lost, forgotten, or stolen.
Based on the popularity of last year's Macro-level ATT&CK Trending, we’ve updated the dataset for another year’s worth of insights. This data summarizes the frequency of MITRE ATT&CK technique observations across thousands of cyber incidents over the past four years. In this post, we’ll look at the contents of the updated dataset, using Splunk to pull out trends based on this ultra large-scale attacker landscape!