cyberattacks

Insecure Deserialization Trend | March Attack Data | Contrast Security
Cyberattackers are shifting their strategy in attacking applications and focusing on one of the most dangerous tactics. For the fourth straight month, the number one tactic was insecure deserialization, aka untrusted deserialization ...

Report Surfaces Sharp Increase in Cyberattacks Aimed at Applications
An analysis of cyberattacks made against applications published this week by Digital.ai, a provider of a platform for securely delivering software, finds a 20% year over year increase, with 83% of applications ...

Application Detection and Response Analysis: Why ADR? How ADR Works, and ADR Benefits
Two highly respected technology analysts from different cybersecurity disciplines are coming together to recommend that companies consider Application Detection and Response. Organizations face a constant barrage of cyber threats, including zero-day vulnerabilities ...

Red Canary Report Surfaces Sharp Increase in Cyberattacks Involving Identity
An analysis of 93,000 threats published this week by Red Canary, a provider of a managed detection and response (MDR) service, finds the number of cyberattacks seeking to compromise an identity increased ...

“My Vas Pokhoronim!”
CISA, in collaboration with the FBI and NSA, identified and attributed multiple attacks to Russian entities, emphasizing the risks posed by state-backed Advanced Persistent Threats (APTs) ...

GhostGPT: An Uncensored AI Chatbot Empowering Cybercriminals
GhostGPT is revolutionizing cybercrime by providing hackers with an AI tool that bypasses ethical guardrails found in mainstream models. Available as little as $150, it enables even novice attackers to generate malicious ...

ADR Report | Application Detection and Response Trends | Contrast Labs
In a startling finding, Contrast Security Application Detection and Response stopped tens of thousands of attacks that made it past perimeter defenses on a single application in mid-January 2025. ...

ADR Report | Application Detection and Response Trends | Contrast Labs
In a startling finding, Contrast Security Application Detection and Response stopped tens of thousands of attacks that made it past perimeter defenses on a single application in mid-January 2025. ...

Flaws in Xerox VersaLink MFPs Spotlight Printer Security Concerns
Two security flaws found in Xerox VersaLink MFPs could allow hackers to capture authentication credentials and move laterally through enterprise networks and highlight the often-overlooked cyber risks that printers and other IoT ...

Cybersecurity Insights with Contrast CISO David Lindner | 01/31/25
Insight No. 1: You should be staging cyberattacks Cyberattacks are becoming more frequent and sophisticated, posing a significant threat to businesses of all sizes.Crisis simulations — one of which is now included ...