Cheating hack stops Apex Legends e-sports tournament

During two separate Apex Legends Global Series live streams this week, hackers were caught inserting so-called “cheat tools” into the game to illegally benefit players. Electronic Arts, publisher of Apex…

Fortra releases update on critical severity RCE flaw

Fortra this week released an update for a critical vulnerability which was initially discovered in August 2023. Classified as CVE-2024-25153 with a Critical Severity CVSS Score of 9.8, the vulnerability…

Airbus cancels planned acquisition of Atos Cybersecurity Group

European aerospace conglomerate Airbus has canceled plans to acquire the Big Data and Security (BDS) business of French IT services company Atos just weeks after opening talks for a potential…

5 ways CISOs can approach their new business role

Today’s CISOs are under attack from many sides, both inside and outside their organizations. Of course, there are many bad actors using new and more sophisticated exploit methods to penetrate…

Suspected Russian data-wiping malware ‘AcidPour’ targeting Linux x86 devices

March 19, 2024PressroomLinux/cyber espionage A new variant of a data-wiping malware called AcidRain, designed specifically to target x86 Linux devices, has been detected in circulation. The malware, nicknamed AcidPour, is…

New regulations make D&O insurance a must for CISOs

Chief Information Security Officers (CISOs) face a variety of daily challenges, including defending against constant attacks from cybercriminals, finding misconfigured servers, and presenting to their users corporate boards of directors…

APIs drive the majority of Internet traffic, and cybercriminals are taking advantage of it

March 19, 2024News about hackersAPI security/vulnerabilities Application programming interfaces (APIs) are the connective tissue behind digital modernization and help applications and databases exchange data more effectively. The State of API…

Cyberattacker ‘PhantomBlu’ backdoors Microsoft Office users via OLE

A malicious email campaign targets hundreds of Microsoft Office users in US-based organizations to deliver a remote access trojan (RAT) which escapes detection, partly by posing as legitimate software. In…

The growing role of artificial intelligence in cyber attacks

March 19, 2024PressroomGenerative AI/incident response The large language models (LLMs) that power artificial intelligence (AI) tools today could be exploited to develop self-enhancing malware that can bypass YARA rules. “Generative…

The new CISO: rethinking the role

COMMENT Companies recognize the importance of cybersecurity and are increasingly incorporating it as an asset into their operational strategies. But by mixing security and operations, organizations may be diluting the…