Security Awareness
Romance Scammers are Adopting Approval Phishing Tactics
Jeffrey Burt | | crypto investment scams, cryptocurrency, online romance scam, Phishing, Pig Butchering Scams
Romance scams are labor-intensive and time-consuming schemes to run. They can be lucrative, pulling in millions in stolen cryptocurrency, but they also can end up going nowhere if the targeted victim becomes ...
Security Boulevard
Unlocking Security Excellence: The Power of SOC-as-a-Service
Suraj Tambare | | Cybersecurity, Cybersecurity As A Service, secops, Security Operation Centre, security operations, SOC, SOC-as-a-Service
The concept of SOC-as-a-service SOCaaS has multiple benefits and empowers organizations to achieve security excellence ...
Security Boulevard
Tools Alone do not Automatically Guarantee Mature Secrets Management
Despite increased cybersecurity spending, there are certain areas where problems are only getting worse, such as secrets sprawl ...
Security Boulevard
LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)
Here’s the final installment of leading technologists sharing their observations about cybersecurity developments in the year that’s coming to a close — and the year to come. Last Watchdog posed two questions: ...
Emerging Technologies, Evolving Threats: Strategies for Future-Proofing Data Security
Aun Sherazi | | AI, attacks, cybercrime, Cybersecurity, Data Privacy, Data Security, deepfake, Phishing, Scams, spear-phishing, technology
With AI's ability to learn from data and continuously refine its tactics, cybercriminals can create more sophisticated, elusive and difficult-to-detect malware ...
Security Boulevard
MY TAKE: Fostering Digital Trust – the role of ‘post-quantum crypto’ and ‘crypto agility’ in 2024
Notable progress was made in 2023 in the quest to elevate Digital Trust. Related: Why IoT standards matter Digital Trust refers to the level of confidence both businesses and consumers hold in ...
Russia Hacks Ukraine, Ukraine Hacks Russia — Day#658
Richi Jennings | | Kyivstar, Russia, russia hacker, Russia-Ukraine, russia-ukraine conflict, Russia's War on Ukraine, Russian Cyber War, Russian cybercrime, SB Blogwatch, Ukraine, ukraine conflict, Ukraine Cyber War, Ukraine cyberattack
When will it end? Russia takes down Kyivstar cellular system, Ukraine destroys Russian tax system ...
Security Boulevard
Stopping Lateral Movement Means Identifying the Small Hops That Take Attackers Far
Mike DeNapoli | | automated red teaming, Breach and attack simulation (BAS), Cybersecurity, Endpoint Detection and Response (EDR), Extended Detection and Response (XDR), lateral movement, small hops
Attackers are opting to use tools that allow them to make countless small hops designed specifically to avoid detection ...
Security Boulevard
Inside the Challenges of XDR Implementation and How to Overcome Them
While XDR tackles the enterprise security challenge of threat detection across a diverse attack surface, it can also create new issues ...
Security Boulevard
LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 1)
A look back at the cybersecurity landscape in 2023 rings all-too familiar: cyber threats rapidly evolved and scaled up, just as they have, year-to-year, for the past 20 years. Related: Adopting an ...