Security News

Navigating Insider Risks: Are your Employees Enabling External Threats?
2024-07-17 11:09

Elevated Privileges: Accidental download of malware by an insider can grant attackers elevated privileges, allowing them to tamper with critical systems or steal large amounts of data. Attackers can impersonate managers and colleagues to manipulate insiders into divulging sensitive information or exercising their privileges to the benefit of the external threat.

Threat Prevention & Detection in SaaS Environments - 101
2024-07-16 11:00

Threat actors are also hijacking non-human identities, including service accounts and OAuth authorizations, and riding them deep into SaaS applications. When threat actors get through the initial defenses, having a robust Identity Threat Detection and Response system in place as an integral part of Identity Security can prevent massive breaches.

Paris 2024 Olympics to face complex cyber threats
2024-07-16 03:00

While previous Olympic games have faced cybersecurity threats, the Games of the XXXIII Olympiad, also known as Paris 2024, will see the largest number of threats, the most complex threat landscape, the largest ecosystem of threat actors, and the highest degree of ease for threat actors to execute attacks, according to IDC. To defend against these attacks and avoid significant disruptions, IDC estimates that revenue from cybersecurity services in France will increase by $94 million in 2024 as a result of the Olympic Games, adding just over two percentage points to total cybersecurity services spending. Paris 2024 will be the most connected games ever, including but not limited to back-of-house systems, financial systems, critical national infrastructure, city infrastructure, sport technology, broadcast technology, and merchandising and ticketing.

Discover the growing threats to data security
2024-07-15 04:00

The first step to managing data security risks is to identify and understand what data you have. Without this level of data visibility, managing data security risks is impossible, because data has no rules.

Diversifying cyber teams to tackle complex threats
2024-07-10 05:00

As cyber threats evolve and increase in volume, traditional approaches for stymieing cyber threats are no longer sufficient. CISOs must prioritize diversity in their teams to counter evolving threats.

Combatting the Evolving SaaS Kill Chain: How to Stay Ahead of Threat Actors
2024-06-28 11:00

The modern kill chain is eluding enterprises because they aren’t protecting the infrastructure of modern business: SaaS.  SaaS continues to dominate software adoption, and it accounts for the...

New Unfurling Hemlock threat actor floods systems with malware
2024-06-27 22:27

A threat actor tracked as Unfurling Hemlock has been infecting target systems with up to ten pieces of malware at the same time in campaigns that distribute hundreds of thousands of malicious files. Security researchers describe the infection method as a "Malware cluster bomb" that allows the threat actor to use one malware sample that spreads additional ones on the compromised machine.

Ease the Burden with AI-Driven Threat Intelligence Reporting
2024-06-24 11:21

Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each story shines a light on underground activities, the threat...

Multiple Threat Actors Deploying Open-Source Rafel RAT to Target Android Devices
2024-06-24 05:04

Multiple threat actors, including cyber espionage groups, are employing an open-source Android remote administration tool called Rafel RAT to meet their operational objectives by masquerading it...

Why are threat actors faking data breaches?
2024-06-24 04:05

The European car rental company immediately launched an investigation, only to discover that the data being sold was completely doctored, possibly using generative AI. Why fake a data breach? Threat actors can announce a fake data breach, which can spark fears, panic and loss of public confidence, causing the stock prices to drop; in this way, cybercriminals can manipulate the market for financial gain.