Security News

The U.S. Department of Justice (DOJ) and the FBI recently collaborated in a multinational operation to dismantle the notorious Qakbot malware and botnet. While the operation was successful in...

The Select Committee on the Chinese Communist Party, spearheaded by US representative and committee chairman Mike Gallagher, penned a letter to secretaries Gina Raimondo, Lloyd Austin, and Janet Yellen requesting an investigation of Chinese LiDAR manufacturers and the appropriateness of sanctions on those entities. "LiDAR is a critical technology used in autonomous systems and robotics but is currently not subject to US export controls or government procurement restrictions, which raises several concerns," reads the letter.

This article describes why threat actors target web apps and highlights the value of continuous monitoring in securing modern web apps. One of the key attractions of web apps from a hacker's perspective is how easy they are to target.

Identity and Access Management (IAM) systems are a staple to ensure only authorized individuals or entities have access to specific resources in order to protect sensitive information and secure...

Effective strategies for mitigating insider threats involve a combination of detective and preventive controls like continuous monitoring, alerting, and automated incident response. SIEM and XDR solutions facilitate the collection and correlation of security events, providing contextual information to assess the severity and potential impact of insider threats.

Cyber resilience is the capacity of an organization to maintain its core functions and swiftly adapt to, respond to, and recover from cyber threats. A cyber-resilient organization recognizes that cyber threats are inevitable and constantly evolves its strategies to address emerging risks.

AI continues to evolve to improve both cyber defense and cyber criminal activities, while regulatory pressures, continued consolidation, and geopolitical concerns will drive more proactive cybersecurity efforts with contextual threat intelligence, according to Cybersixgill. As organizations increasingly adopt Threat Exposure Management - a proactive approach to cybersecurity - Cybersixgill believes that cyber threat intelligence will emerge as a foundational component of TEM and play a central role as leaders across organizations make critical, strategic business decisions.

Phishing, infostealer malware, ransomware, supply chain attacks, data breaches and crypto-related attacks are among the top evolving threats in the financial sector, says Sekoia. A new report from French-based cybersecurity company Sekoia describes evolutions in the financial sector threat landscape.

According to Kaspersky, APT attackers might expand their surveillance efforts to include more smart home technology devices, such as smart home cameras and connected car systems. Attacks leveraging botnets might "Obscure the targeted nature of the attack behind seemingly widespread assaults," according to the researchers.

AI, post-quantum cryptography, zero trust, cryptography research, and election security will shape cybersecurity strategies in the present and for 2024, according to NTT. As the world emerged from the pandemic and continued to adapt to the rapid implementation of digital transformation, businesses witnessed the rise of sophisticated ransomware attacks, state-sponsored cyber espionage and the constant need to secure the ever-expanding IoT. AI's impact on cybersecurity strategies in 2024. AI promises to impact both cybercriminal behavior and cybersecurity strategies in 2024.