Security News

Researchers unearth MotW bypass technique used by threat actors for years
2024-08-06 11:28

Threat actors have been abusing a bug in how Windows handles LNK files with non-standard target paths and internal structures to prevent in-built protections from stopping malicious payloads and trick users into running them. If the file is not listed, SmartScreen will prevent the file from being executed and show a warning.

Suspicious Minds: Insider Threats in The SaaS World
2024-08-06 11:17

According to CSA research, 26% of companies who reported a SaaS security incident were struck by an insider. Learn how to secure your entire SaaS stack from both internal and external threats.

CrowdStrike unhappy about Delta's 'litigation threat,' claims airline refused 'free on-site help'
2024-08-05 12:32

"Delta's public threat of litigation distracts from this work and has contributed to a misleading narrative that CrowdStrike is responsible for Delta's IT decisions and response to the outage," the letter reads. "Should Delta pursue this path, Delta will have to explain to the public, its shareholders, and ultimately a jury why CrowdStrike took responsibility for its actions - swiftly, transparently, and constructively - while Delta did not."

MISP: Open-source threat intelligence and sharing platform
2024-08-05 04:00

MISP is an open-source threat intelligence and sharing platform for collecting, storing, distributing, and sharing cybersecurity indicators and threats related to incident and malware analysis....

Threat intelligence: A blessing and a curse?
2024-08-01 04:25

Access to timely and accurate threat intelligence is now core to security operations for many organizations. Typically, security teams gather large amounts of threat intelligence from multiple places in different and incompatible formats.

Cyber Threat Intelligence: Illuminating the Deep, Dark Cybercriminal Underground
2024-07-30 10:50

Each story shines a light on underground activities, the threat actors involved, and why you should care, along with what you can do to mitigate risk. This comprehensive analysis, compiled by Cybersixgill's cyber threat intelligence experts, provides valuable insights into the tactics, techniques, and technologies employed by threat actors worldwide.

Enhancing threat detection for GenAI workloads with cloud attack emulation
2024-07-29 05:00

Cloud GenAI workloads inherit pre-existing cloud security challenges, and security teams must proactively evolve innovative security countermeasures, including threat detection mechanisms. More recently, detection engineering has spun off as a specialized aspect of threat detection, allowing detection engineers to customize threat detection systems.

Cloud security threats CISOs need to know about
2024-07-25 04:00

In this Help Net Security interview, Ava Chawla, Head of Cloud Security at AlgoSec, discusses the most significant cloud security threats CISOs must be aware of in 2024. These threats include data...

Protecting AI systems from cyber threats
2024-07-23 17:07

Join Intel, DETASAD, Juniper Networks, and Arqit to hear essential strategies in this webinar on July 30th Webinar Artificial Intelligence (AI) is revolutionizing industries worldwide, but with...

The changes in the cyber threat landscape in the last 12 months
2024-07-23 11:24

When it comes to the cyber threat landscape, change is the only constant: the inevitable interplay between cybercriminals and law enforcement agencies makes it inevitable. Europol's recently released Internet Organised Crime Threat Assessment 2024 report covers events - law enforcement actions - that happened in the last 12 months and how the cyber threat landscape shifted because of them.