Security News

Crafty threat actor uses 'aged' domains to evade security platforms
2022-11-30 08:05

A sophisticated threat actor named 'CashRewindo' has been using aged domains in global malvertising campaigns that lead to investment scam sites. [...]

How to find hidden data breaches and uncover threats in your supply chain
2022-11-30 05:15

A company's supply chain is like a body's nervous system: a mesh of interconnected manufacturers, vendors, sub-contractors, service delivery firms, even coding and collaboration tools. A recent study by NCC Group estimated that supply chain attacks increased by 51% in the last six months of 2021, and the BlackHat 2022 conference featured a number of talks highlighting the vulnerability of supply chains not just between companies connected by business operations, but also software coding practices.

CIO Essential Guidance: CISO Security Threat landscape
2022-11-28 00:00

Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever.

Top Cyber Threats Facing E-Commerce Sites This Holiday Season
2022-11-23 12:13

According to Digital Commerce 360, nearly $1.00 of every $4.00 spent on retail purchases during the 2022 holiday season will be spent online, resulting in $224 billion in e-commerce sales. Many e-commerce sites are inherently insecure and vulnerable to attack due to their reliance on untrustworthy third-party solutions.

Threat actors extend attack techniques to new enterprise apps and services
2022-11-23 04:00

The past few years have witnessed the rapid adoption of new cloud collaboration apps, cloud storage and services for employee productivity and external collaboration as organizations across the world have embraced new work patterns. Threat actors have pivoted their attack toolkits to extend beyond email and the web browser to the new apps and services that enterprises have adopted.

Threat hunting with MITRE ATT&CK and Wazuh
2022-11-18 12:07

Wazuh offers robust capabilities like file integrity monitoring, security configuration assessment, threat detection, automated response to threats, and integration with solutions that provide threat intelligence feeds. Wazuh comes with the MITRE ATT&CK module out-of-the-box and threat detection rules mapped against their corresponding MITRE technique IDs.

Top enterprise email threats and how to counter them
2022-11-15 04:00

A research from Tessian, the State of Email Security Report, found that enterprise email is now the No. 1 threat vector for cyberattacks. These types of attacks also ranked as the top enterprise email threat that security leaders are most concerned about.

How Modern Security Teams Fight Today’s Cyber Threats
2022-11-10 00:00

You will also receive a complimentary subscription to TechRepublic's News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.

How Modern Security Teams Fight Today’s Cyber Threats (previously known as Plight of Modern Security Teams)
2022-11-10 00:00

You will also receive a complimentary subscription to TechRepublic's News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.

What is software threat modeling and how to use it effectively
2022-11-09 05:00

The importance of software threat modeling continues to grow. NIST advises software engineers to adhere to secure software development best practices and do software threat modeling repeatedly during the development process, especially when creating new capabilities.