cyberattack
IONIX ASM Platform Adds Testing Tools to Simulate Cyberattacks
IONIX extended its ASM platform to include the ability to use simulations to conduct tests without disrupting production environments ...
Security Boulevard
Poor Credential Hygiene
Joao Correia | | Article Series, credential hygiene, cyberattack, cybersecurity misconfiguration, NSA/CISA, Top top 10 cybersecurity misconfigurations
This article is part of a series where we look at a recent NSA/CISA Joint Cybersecurity Advisory on the top cybersecurity issues identified during red/blue team exercises operated by these organizations. In ...
A Cyber Insurance Backstop
In the first week of January, the pharmaceutical giant Merck quietly settled its years-long lawsuit over whether or not its property and casualty insurers would cover a $700 million claim filed after ...
SEC’s X Breach Highlights Need for Better Defense Against SIM Swap Attacks
The ease with which fraudsters applied the SIM swap attack on the SEC indicates the issue should be a top concern for all organizations ...
Security Boulevard
Ultimate Guide to Identity Threat Detection and Response (ITDR)
Blog Archives - Gurucul | | Analytics & Intelligence, Blog, cyberattack, Identity & Access Analytics, threat detection
Learn the fundamentals of what Identity Threat Detection and Response (ITDR) is, why it’s necessary and how to select the right ITDR solution. The post Ultimate Guide to Identity Threat Detection and ...
What the Charges Against the SolarWinds CISO Mean for Security in 2024
The indictment of the SolarWinds CISO by the SEC served as a harsh wake-up call to the corporate world ...
Security Boulevard
The Evolving Threat Landscape: Where Out-of-Band Communications Fit – Part Two
Navroop Mitter | | cyberattack, Cybersecurity, Incident Response, out-of-band communications, Threat, Threat Intelligence
It's important to establish and test out-of-band communication before you experience an attack, or 'left-of-bang.' ...
Security Boulevard
JinxLoader Malware: Next-Stage Payload Threats Revealed
Wajahat Raja | | ADNOC, APTs, cyberattack, Cybersecurity News, CybersecurityThreats, CyberThreatIntelligence, CyberThreatLandscape, DarkGate, FormBook, IDATLoader, JinxLoaderMalware, MalwareLoader, NarwalSpider, paloaltonetworks, PayloadDelivery, PhishingCampaigns, PikaBot, RemcosRAT, RugmiMalware, Symantec, TA544, VortexStealer, XLoader
In the ever-evolving landscape of cybersecurity, a recent discovery by Palo Alto Networks Unit 42 and Symantec sheds light on a new Go-based malware loader named JinxLoader malware. This sophisticated tool is ...
London Calling: Hey, US, Let’s Chat About Cyber AI – The Next WannaCry
Mark Cunningham-Dickie | | AI, AI-based attack, Artificial Intelligence, cyber AI, Cyber Grand Challenge, Cyber-attack, cyberattack, Cybersecurity, NotPetya attack, WannaCry attack
Artificial intelligence (AI)-based attacks would likely possess greater adaptability and evasion capabilities than WannaCry and NotPetya ...
Security Boulevard
The Evolving Threat Landscape: Where Out-of-Band Communications Fit – Part One
Navroop Mitter | | cyberattack, Cybersecurity, Incident Response, out-of-band communications, Threat, Threat Intelligence
Out-of-band communication is a necessity to prohibit outsiders from observing internal incident response activities or taunting response teams ...
Security Boulevard