Russian hacking group Armageddon has upgraded its skills to simultaneously target several thousand Ukrainian government information systems. CERT-UA said the hackers infected Microsoft Office Word to generate 80 to 120 malicious documents within a compromised system to multiply the infection.
To rethink security strategies, enterprises should tap into edge computing, adopt technologies such as generative AI and ensure "secure by default" practices, said Fastly Vice President Sean Leach. He discussed the evolving risk landscape and third-party providers' role in managing security.
Generative AI is growing rapidly as organizations seek ways to transform human tasks. With the ability to process and analyze large volumes of data in real time, AI can empower defenders to detect and respond to threats more effectively, said John Giamatteo, cybersecurity president at BlackBerry.
With the growing reliance on digital technologies and the escalating sophistication of cyberthreats, organizations need to be prepared for potential cyber incidents and establish the ability to recover from them, according Rubrik's Abhilash Purushothaman.
Threat actors are using dedicated mobile Android OS device spoofing tools to defraud customers of online banking, payment systems, advertising networks and online marketplaces globally. Resecurity observed cybercriminals using spoofing tools to exploit stolen cookies and access victims' systems.
Supply chain attacks, such as the MOVEit data breach that has affected more than 150 organizations, are "the nature of the landscape now," said security leader Ian Hill of Upp Corp. The answer to this scourge may be using generative AI to qualify partners and to analyze and score supply chain risk.
There is a need to redefine the cybersecurity strategy for CISOs to align with their strategic goals of building cyber resiliency and automation to scale up today’s defenses in supporting the business, said Diwakar Dayal, managing director and country manager, India and SAARC, SentinelOne.
Apart from some of the threats surrounding AI, this emerging technology can help defenders formulate effective policies and controls to prevent and mitigate BEC scams. With the evolving threat landscape, harnessing AI becomes crucial in defending, said Johan Dreyer, CTO at Mimecast.
British prosecutors have accused two teenagers of several high-profile hacks while being part of the now-inactive, teenager-dominated Lapsus$ hacking group, clearing the way for their legal prosecution. The two suspects face charges related to blackmail, fraud and Computer Misuse Act violations.
Orca has accused cloud security rival Wiz of violating two patents associated with securing virtual machines and virtual cloud assets at rest against cyberthreats. Orca's complaint accused Wiz of patent infringement across its portfolio, including in its CNAPP, CSPM, CIEM, DSPM, IaC and CDR tools.
Retired four-star Gen. Keith Alexander resigned as IronNet's CEO as part of a deal with C5 Capital to take the beleaguered threat detection firm private. C5 extended IronNet a financial lifeline in exchange for Alexander, 71, giving up day-to-day management of the company he founded nine years ago.
A new malware campaign powered with multistage attack methodology is targeting businesses in the LATAM region using specially crafted modules. The newly identified Trojan, dubbed Toitoin, follows a six-stage attack plan in which each stage is custom-designed to carry out malicious activities.
Honeywell plans to purchase an OT security vendor founded by Israel Defense Forces veterans to deliver asset discovery, threat detection and compliance management to industrial organizations. The SCADAfence acquisition will allow Honeywell to offer an end-to-end enterprise OT cybersecurity platform.
The threat actor behind the remote access Trojan called RomCom and other pro-Russian groups are targeting Ukrainian agencies and allies ahead of the NATO Summit this week in Vilnius, Lithuania, using weaponized Microsoft documents and typosquatting techniques to deliver the malware.
The Telecom Regulatory Authority of India has mandated that telco firms deploy AI filters to block unsolicited calls and messages. But who will create this model, and who will acquire the data? Anand Venkatanarayanan, co-founder of DeepStrat, discussed multiple issues that need to be resolved.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.