A Former Hacker Explains How to Fight Ransomware (Pure Storage)
Cybercriminals are becoming increasingly bold these days, evolving their tactics and attacks as fast as we can evolve our defenses. What if, in the ongoing war against cybercrime, you could get intel on what they’re up to straight from a former hacker? Now you can.
Cybersecurity Stop of the Month: MFA Manipulation (Proofpoint)
This malicious post-compromise attack poses a significant threat to cloud platforms. We cover the typical attack sequence to help you understand how it works. And we dive deeper into how Proofpoint account takeover capabilities detected and prevented one of these threats for our customer.
CyberArk Labs’ 2023 Threat Research Highlights (CyberArk)
Throughout an eventful 2023, CyberArk Labs remained focused on uncovering emerging cyberattack patterns and producing threat research aimed at helping organizations strengthen their identity security defenses.
This Is The Way ft. Bryon Singh, RailWorks Corporation
Understanding the Lines Between EDR, NDR, TDR, XDR, and MDR (Arctic Wolf)
Acronym fatigue has led to confusion among organizations who are either unfamiliar with the terms or are unsure which detection and response solution best fits their security and business goals.
Microsoft Returns to the Top Spot as the Most Imitated Brand in Phishing Attacks for Q4 2023 (Check Point)
The latest Brand Phishing Report from Check Point Research sees Microsoft as the number one impersonated brand by cybercriminals with the technology sector dominating the top ten.
Infrastructure Matters: Making Workload Migration Efficient and Cost-Effective (Nutanix)
Modern organizations are faced with the dual challenge of not only building infrastructure that accommodates their newly developed apps but also ensuring seamless mobility for apps and data across diverse environments and between different clouds and on-premises setups. Workload migration and portability are essential to modernizing your applications and fully embracing the benefits of the cloud.
I'm (not) Batman ft. Bryon Singh, RailWorks Corporation
Pioneering Data Center Security with Fortinet's Broad Portfolio (Fortinet)
Adaptability, reliability, and scalability are paramount in this rapidly evolving environment. Traditional cybersecurity solutions struggle to keep pace with the exponential growth of data and applications and AI's game-changing impact on the threat landscape.
Malware Takedowns Show Progress, But Fight Against Cybercrime Not Over
Takedown of malware infrastructure by law enforcement has proven to have an impact, albeit limited, on cybercriminal activity, according to threat intelligence provider Recorded Future.
Check Point Research: 2023 – The year of Mega Ransomware attacks with unprecedented impact on global organizations (Check Point)
A Staggering 1 in every 10 organizations worldwide hit by attempted Ransomware attacks in 2023, surging 33% from previous year, when 1 in every 13 organizations received ransomware attacks.
Cloud-Powered Post-Delivery Defense: Proofpoint's Latest Innovation in Email Protection (Proofpoint)
Cybercriminals are constantly innovating so that they can infiltrate your systems and steal your valuable data. They do this through a complex multi-stage method commonly known as the attack chain.
How AI-Powered Security Capabilities Implement Real-Time Cybersecurity (Palo Alto Networks)
It’s clear that AI will continue to shape modern cybersecurity drastically, driving both advantages and risks for businesses. From securing AI, to safely developing with AI, to safely consuming AI, the use of AI is widespread and will only continue to accelerate.
Botnet fuels Androxgh0st malware’s punch
In a joint Jan. 16 advisory, the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI revealed new details about the malware which they said was gleaned from their involvement in multiple, ongoing investigations.
Securing Your IoT Network: 5 Best Practices to Protect Your Business (Arctic Wolf)
At its core, IoT offers virtually endless options for extending IP network connectivity to domains that have traditionally lacked it. Every sector, from healthcare to manufacturing, can leverage IoT to connect disparate systems and achieve new operational goals.
3 Critical Steps for Application Security Teams in 2024 (CrowdStrike)
As application security teams head into a new year, these are the key issues they should keep in mind and steps they must take to defend their custom software applications.