Category: feeds.feedburner.com

Endpoint malware attacks decline as campaigns spread wider

In Q2 2023, 95% of malware now arrives over encrypted connections, endpoint malware volumes are decreasing despite campaigns growing more widespread, ransomware detections are declining amid a rise in double-extortion attacks, and older software vulnerabilities persist as popular targets for…

VERT Threat Alert: October 2023 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s October 2023 Security Updates , which includes a recently introduced release notes format. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1077 on Wednesday, October 11th. In-The-Wild & Disclosed CVEs…

Clorox’s Profit Takes Major Hit Due to Cyberattack

Clorox issued a warning that its financial performance suffered a considerable setback in the quarter ending September 30, primarily attributed to the lingering impacts of a cyberattack that disrupted its operations. The manufacturer of bleach and cleaning products anticipates a…

SailPoint Atlas helps enterprises manage and secure their identities

SailPoint unveiled the SailPoint Atlas platform. SailPoint Atlas is the next-generation multi-tenant SaaS platform that delivers the critical elements needed to build, maintain, and scale a strong, enterprise-class identity security program. Serving as the foundation for the SailPoint Identity Security…

Florida Circuit Court,Victim of a Ransomware Attack

The ALPHV ransomware group, also known as BlackCat, has claimed responsibility for a cyberattack that disrupted numerous state courts in Northwest Florida, specifically within the First Judicial Circuit, last week. Allegedly, the malicious actors were able to obtain sensitive personal…

How to Protect Against Data Lake Hacking

Data lakes, or centralized repositories for large-scale data, are a popular solution for data storage, and there are good reasons for that. Data lakes are flexible and cost-effective, as they allow many object formats and multiple query engines, and there…

Protecting Against HTTP/2 Rapid Reset

Today, Google disclosed a zero-day vulnerability in the HTTP/2 protocol. Imperva collaborated proactively with Google to gain advanced insights into this vulnerability. After a comprehensive inspection of this vulnerability by Imperva’s Product Development and Threat Research teams, we can confirm…

GNOME users at risk of RCE attack (CVE-2023-43641)

If you’re running GNOME on you Linux system(s), you are probably open to remote code execution attacks via a booby-trapped file, thanks to a memory corruption vulnerability (CVE-2023-43641) in the libcue library. About CVE-2023-43641 Discovered by GitHub security researcher Kevin…

C-suite weighs in on generative AI and security

Generative AI (GenAI) is poised to deliver significant benefits to enterprises and their ability to readily respond to and effectively defend against cyber threats. But AI that is not itself secured may introduce a whole new set of threats to…

Cybersecurity Trends to Watch in the US in the Next 5 Years

As cyber threats grow more frequent and sophisticated, the need for vigilant defense is paramount, and cybersecurity is top of mind for organizations nationwide. Understanding the threat landscape and current and future trends is crucial to designing effective security strategies…

7 Best MXDR Services

On a market continuously faced with workforce shortage, with a gap of 3.4 million workers globally (ISC2), businesses need to adapt their cybersecurity strategy and consider external services that can provide an incident response team, such as Managed Extended Detection…

Why security is the bedrock of success for mainframe projects

Enterprises looking to update their mission-critical operations are approaching modernization in three ways – modernizing on the mainframe, integrating with the hyperscalers, or moving off to the cloud, according to a recent Kyndryl report. Almost all respondents use a combination…

Turning military veterans into cybersecurity experts

In this Help Net Security interview, James Murphy, the Director of the TechVets Programme at the Forces Employment Charity, discusses the challenges that military veterans face when transitioning from military to civilian life. One significant hurdle is the difficulty they…

Cybersecurity pros predict rise of malicious AI

76% of cybersecurity professionals believe the world is very close to encountering malicious AI that can bypass most known cybersecurity measures, according to Enea. 26% see this happening within the next year, and 50% in the next 5 years. Worries…