Getting off the Attack Surface Hamster Wheel: Identity Can Help

11/01/2024 0 Comments 0 tags

IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how to quantify it and how to manage it.  The process is simple: begin

NoaBot: Latest Mirai-Based Botnet Targeting SSH Servers for Crypto Mining

11/01/2024 0 Comments 0 tags

A new Mirai-based botnet called NoaBot is being used by threat actors as part of a crypto mining campaign since the beginning of 2023. “The capabilities of the new botnet, NoaBot, include

North Korea’s Cyber Heist: DPRK Hackers Stole $600 Million in Cryptocurrency in 2023

09/01/2024 0 Comments 0 tags

Threat actors affiliated with the Democratic People’s Republic of Korea (also known as North Korea) have plundered at least $600 million in cryptocurrency in 2023. The DPRK “was responsible for

DoJ Charges 19 Worldwide in $68 Million xDedic Dark Web Marketplace Fraud

09/01/2024 0 Comments 0 tags

The U.S. Department of Justice (DoJ) said it charged 19 individuals worldwide in connection with the now-defunct xDedic Marketplace, which is estimated to have facilitated more than $68 million in

NIST Warns of Security and Privacy Risks from Rapid AI System Deployment

09/01/2024 0 Comments 0 tags

The U.S. National Institute of Standards and Technology (NIST) is calling attention to the privacy and security challenges that arise as a result of increased deployment of artificial intelligence (AI) systems in

Webinar – Leverage Zero Trust Security to Minimize Your Attack Surface

09/01/2024 0 Comments 0 tags

Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors increasingly exploit the vulnerabilities stemming from software and infrastructure exposed to the internet; this ironically

Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and Strategy

09/01/2024 0 Comments 0 tags

Cybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon Institute1, “only 59% of organizations say their cybersecurity strategy has changed over the

Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals

09/01/2024 0 Comments 0 tags

Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT) called Silver RAT that’s equipped to bypass security software and stealthily launch hidden applications. “The developers operate

Pro-Iranian Hacker Group Targeting Albania with No-Justice Wiper Malware

06/01/2024 0 Comments 0 tags

The recent wave of cyber attacks targeting Albanian organizations involved the use of a wiper called No-Justice. The findings come from cybersecurity company ClearSky, which said the Windows-based malware “crashes the operating system in a

Sea Turtle Cyber Espionage Campaign Targets Dutch IT and Telecom Companies

06/01/2024 0 Comments 0 tags

Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the Netherlands have been targeted as part of a new cyber espionage campaign undertaken by a