Security News

Researchers Highlight Google's Gemini AI Susceptibility to LLM Threats
2024-03-13 10:14

Google's Gemini large language model (LLM) is susceptible to security threats that could cause it to divulge system prompts, generate harmful content, and carry out indirect injection attacks. The...

CTEM 101 - Go Beyond Vulnerability Management with Continuous Threat Exposure Management
2024-03-12 11:07

In a world of ever-expanding jargon, adding another FLA (Four-Letter Acronym) to your glossary might seem like the last thing you’d want to do. But if you are looking for ways to continuously...

BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks
2024-03-11 09:53

The threat actors behind the BianLian ransomware have been observed exploiting security flaws in JetBrains TeamCity software to conduct their extortion-only attacks. According to a new report from...

Insider threats can damage even the most secure organizations
2024-03-11 04:00

Insider threats encompass both intentional and unintentional actions. The challenge for organizations is not only to detect and mitigate malicious insider activities but also to cultivate a culture of security awareness and proactive risk management across all levels of the workforce.

How new and old security threats keep persisting
2024-03-08 06:00

Security leaders recognize that the pattern of buying new tech and the frantic state of find-fix vulnerability management is not working, according to Cymulate. Rather than waiting for the next big cyberattack and hoping they have the right defenses in place, security leaders are now more than ever implementing a proactive approach to cybersecurity by taking action to identify and address security gaps before attackers find and exploit them.

Web-based PLC malware: A new potential threat to critical infrastructure
2024-03-07 11:45

"Our Web-Based PLC malware resides in PLC memory, but ultimately gets executed client-side by various browser-equipped devices throughout the ICS environment. From there, the malware uses ambient browser-based credentials to interact with the PLC's legitimate web APIs to attack the underlying real-world machinery," the researchers explained. "While previous attacks on PLCs infect either the control logic or firmware portions of PLC computation, our proposed malware exclusively infects the web application hosted by the emerging embedded webservers within the PLCs," the researchers noted.

Major shifts in identity, ransomware, and critical infrastructure threat trends
2024-03-07 05:00

In this Help Net Security video, Michelle Alvarez, Strategic Threat Analysis Manager at IBM X-Force, discusses the 2024 X-Force Threat Intelligence Index, revealing top threats and trends the team observed last year across its global engagements and how these shifts are forming the threat landscape in 2024 and beyond. X-Force observed shifts toward credential-driven attacks with a 71% increase in attacks caused by using valid accounts.

Ahead of Super Tuesday, US elections face existential and homegrown threats
2024-03-04 01:15

Feature Two US intelligence bigwigs last week issued stark warnings about foreign threats to American election integrity and security - and the nation's ability to counter these adversaries. A few days earlier, US senator Mark Warner, who chairs the Senate's Intelligence Committee, told Trellix CEO Bryan Palma that the United States is less prepared to combat foreign intervention in the 2024 elections than was the case in 2020.

In the vanguard of 21st century cyber threats
2024-03-01 16:00

Webinar The quantum threat might seem futuristic, more like something you'd encounter in a science fiction film. It's arguably already a danger to real cyber security defences.

Keeping one step ahead of cyber security threats
2024-03-01 09:05

Webinar Dealing with cyber security incidents is an expensive business. Each data breach costs an estimated $4.35 million on average and it's not as if the volume of cyber attacks is falling - last year, they rose by 38 percent according to Google Cloud.