For security professionals, compliance may not be the most attractive topic, but it is important for a variety of reasons. Security teams are important stakeholders in governance, risk and compliance…
Category: Cyber Security
The Ivanti breach requires CISA to take systems offline
According to officials, threat actors breached Cybersecurity and Infrastructure Security Agency (CISA) systems by exploiting vulnerabilities in Ivanti products as early as February. The suspicious activity was first identified a…
The role of the CISO is changing. Can CISOs themselves keep up?
The role of the Chief Information Security Officer (CISO) has expanded over the past decade thanks to rapid digital transformation. CISOs now must be much more business-oriented, wear many more…
IT-Harvest reaches milestone with 10,000 cybersecurity products added to dashboard
PRESS RELEASE BIRMINGHAM, Mich., March 11, 2024/PRNewswire/ — IT-Harvest, the only provider of comprehensive data on the cybersecurity industry, is excited to announce a significant milestone in its journey. IT-Harvest’s…
Sophisticated vishing campaigns take the world by storm
Voice phishing, or vishing, is experiencing a moment of great relevance, with numerous active campaigns around the world that are ensnaring even experienced victims who may seem more knowledgeable, in…
The typosquatting wave shows no signs of abating
Ever since the Internet became a commercial entity, hackers have used it to impersonate companies through a variety of clever means. And one of the most enduring of these exploits…
The anti-fraud project strengthens the security of African and Asian financial systems
A non-profit organization has launched the first open source platform aimed at providing sophisticated anti-fraud capabilities to financial systems in Africa, as well as parts of Asia and the Middle…
New banking trojan CHAVECLOAK targets Brazilian users via phishing tactics
Users in Brazil are the target of a new banking trojan known as CHAVECLOAK which is propagated via phishing emails with PDF attachments. “This intricate attack involves PDF downloading a…
How not to become the target of the next Microsoft hack
COMMENT The cybersecurity landscape, particularly within the Microsoft 365 ecosystem, is constantly evolving. Recent incidents involving major technology and cybersecurity companies highlight a critical reality: Understanding security best practices for…
BianLian threat actors exploit JetBrains TeamCity flaws in ransomware attacks
March 11, 2024PressroomRansomware/Vulnerabilities Threat actors behind the BianLian ransomware have been observed to exploit security flaws in JetBrains TeamCity software to conduct their extortion-only attacks. According to a new report…