cyberthreat

ChatGPT at Work: What’s at Stake for Employers?
Companies around the world are taking measures to regulate how their employees use OpenAI’s ChatGPT at work. As with all new technologies, generative AI models like ChatGPT can provide benefits, but there ...
Cyberthreat Defense Report 2022: Key Points You Should Know
Each year, CyberEdge publishes the Cyberthreat Defense Report (CDR). Aimed at IT security leaders, this comprehensive report outlines the threats, security issues, and industry concerns that are most pressing. Information summarized in ...

Colonial’s Ransom Payment Indicates Severity of Threats
Last week Joseph Blount, the CEO of Colonial Pipeline, told The Wall Street Journal that he authorized the ransom payment of $4.4. million to the hackers who broke into computer systems and ...

Assessing the New Normal for Cybersecurity
As work from home continues, cyberthreats related to the new normal will remain even post-pandemic “Pandemic” was the word of the year, with runners up including quarantine, coronavirus and asymptomatic. They make ...

Inside the DoJ’s GRU Indictments for Cyber Meddling
For the third time in the past two years, the United States has indicted intelligence officers associated with Russia’s Main Intelligence Directorate (GRU), the military intelligence entity of the General Staff of ...

Netskope Unveils Free Real-Time Threat Intelligence Exchange
Netskope today launched a Cloud Threat Exchange portal through which it will share threat intelligence with customers and partners for free. Company CTO Krishna Narayanaswamy said the Cloud Threat Exchange will automate ...

Why Ransomware Isn’t Going Away Anytime Soon
2019 was an extremely successful year for ransomware, rife with attacks and many high-profile victims. Of all the cyberthreats, ransomware was proven to be the most devastating. In the UK, it was ...

7 Key Features of a Breach and Attack System
Truly effective organizational security begins with anticipation and ends with continuous testing. To defeat hackers, it’s imperative to assume their perspective to help anticipate their next move. When you understand an attacker’s ...

Check Point Reveals Azure Cloud Security Flaw
Check Point Software Technologies revealed today its researchers were able to exploit a flaw to take over servers in the Microsoft Azure Cloud. The flaw in the Azure App Service used to ...

DHS Cyber Agency Seeks Subpoena Authority to Obtain Cyber ‘Victim’ Info
On Dec. 12, senators Ron Johnson (R. Wis.) and Maggie Hassan (D. N.H.) introduced legislation that would grant DHS’ Cybersecurity and Infrastructure Security Agency (CISA) the authority to issue subpoenas to force ...