fbpx
New BunnyLoader threat emerges as a feature-rich malware-as-a-service

New BunnyLoader threat emerges as a feature-rich malware-as-a-service

Security researchers discovered a new malware-as-a-service (MaaS) named ‘BunnyLoader’ advertised on multiple hacker forums as a fileless loader that can steal and replace the contents of the system clipboard. The malware is under rapid development, with updates adding new features and bug fixes. It can currently download and execute payloads, log keys, steal sensitive data […]

New BunnyLoader threat emerges as a feature-rich malware-as-a-service Read More »

AI-assisted cybersecurity: 3 key components you can't ignore | VentureBeat

Microsoft’s Bing AI Faces Malware Threat From Deceptive Ads – Infosecurity Magazine

Microsoft’s Bing Chat has come under scrutiny due to a significant security concern – the infiltration of malicious ads. Malwarebytes researchers have now demonstrated how unsuspecting users seeking software downloads can be tricked into visiting malicious websites and unwittingly downloading malware. Bing Chat, an artificial intelligence (AI) interactive text and image application powered by OpenAI’s

Microsoft’s Bing AI Faces Malware Threat From Deceptive Ads – Infosecurity Magazine Read More »

Celebrating 20 Years Of Cybersecurity Awareness: Secure Our World

Celebrating 20 Years Of Cybersecurity Awareness: Secure Our World

October is a month known for many things: the change of seasons, the approach of Halloween, and, importantly, Cybersecurity Awareness Month. This year is especially momentous as it marks the 20th annual Cybersecurity Awareness Month, a collaborative effort launched by the Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA). The Origin

Celebrating 20 Years Of Cybersecurity Awareness: Secure Our World Read More »

The Anatomy of a Resilient Infrastructure: Mitigating Risks and Ensuring Protection

The Anatomy of a Resilient Infrastructure: Mitigating Risks and Ensuring Protection

The Anatomy of a Resilient Infrastructure: Mitigating Risks and Ensuring Protection Introduction Organisations must take a multifaceted approach to secure their digital assets in an era of rapidly evolving cyber threats. This comprehensive article delves deep into the labyrinth of infrastructure security, examining its various components: the software layer, the hardware layer, and advanced security

The Anatomy of a Resilient Infrastructure: Mitigating Risks and Ensuring Protection Read More »

Strategies For Merchant Ransomware Protection

Merchant Ransomware Protection Strategies For Merchant Ransomware Protection

Ransomware attacks have become a significant threat to businesses of all sizes, including merchants who rely on electronic payment systems for their operations. These malicious attacks can lock you out of your critical systems, encrypt your data, and demand a hefty ransom in exchange for the decryption key. To safeguard your business and customer data,

Merchant Ransomware Protection Strategies For Merchant Ransomware Protection Read More »

Ransomware attacks down in August after record levels in July

Ransomware attacks down in August after record levels in July

August 2023 saw a drop in ransomware attacks, according to NCC Group’s August Threat Pulse, with 390 attacks representing a 22% drop from July.  It comes after back-to-back record months in June and July, largely the result of Cl0ps MOVEit exploitation and the ongoing impact of the attack.  Lockbit 3.0 back in the top spot

Ransomware attacks down in August after record levels in July Read More »

OPSWAT-Sponsored SANS 2023 ICS/OT Cybersecurity Report Reveals Vital Priorities to Mitigate Ongoing Threats

OPSWAT-Sponsored SANS 2023 ICS/OT Cybersecurity Report Reveals Vital Priorities to Mitigate Ongoing Threats

Tampa, FL – September 21, 2023 — OPSWAT, a leader in critical infrastructure protection (CIP) cybersecurity solutions, sponsored the SANS 2023 ICS/OT Cybersecurity Survey, which unveils a distinct reality: despite notable improvements in defense strategies, including increased ICS cybersecurity awareness and enhanced incident response plans, survey respondents collectively consider current cybersecurity threats to ICS as severe/critical (25%)

OPSWAT-Sponsored SANS 2023 ICS/OT Cybersecurity Report Reveals Vital Priorities to Mitigate Ongoing Threats Read More »

ClassLink Provides Cybersecurity Training Course to Help Schools Protect Public Directory Data

ClassLink Provides Cybersecurity Training Course to Help Schools Protect Public Directory Data

CLIFTON, N.J., Sept. 19, 2023 /PRNewswire/ — ClassLink, the leading provider of identity and access management (IAM) products for education, unveils Scope Your Google Directory, a timely ClassLink Academy course designed to protect schools from directory scraping. In today’s digital age, schools’ increasing reliance on technology to streamline operations brings new challenges and threats, including directory scraping. Directory

ClassLink Provides Cybersecurity Training Course to Help Schools Protect Public Directory Data Read More »

Cisco acquires cybersecurity firm Splunk for jaw-dropping $28B | VentureBeat

Cisco acquires cybersecurity firm Splunk for jaw-dropping $28B | VentureBeat

Head over to our on-demand library to view sessions from VB Transform 2023. Register Here Cisco today announced it is acquiring cybersecurity and observability leader Splunk in a cash deal worth $28 billion.  The San Jose, California-based networking giant said the move will bring together both companies’ capabilities to drive the next generation of AI-enabled

Cisco acquires cybersecurity firm Splunk for jaw-dropping $28B | VentureBeat Read More »

Understanding the Differences Between On-Premises and Cloud Cybersecurity

Understanding the Differences Between On-Premises and Cloud Cybersecurity

The difference between managing cybersecurity in on-premises and cloud environments is not unlike playing traditional versus three-dimensional chess. While the tactics are similar and goals are the same — reduce risk, protect confidential data, meet compliance requirements, and the like — the cloud adds complexity that completely changes the dynamic. The cloud’s architecture, lack of

Understanding the Differences Between On-Premises and Cloud Cybersecurity Read More »

Scroll to Top