fbpx

Richard Giddey

Analyzing The Downtrend: A Look Into The 2022-23 Cybersecurity Budget Benchmark Summary

Analyzing The Downtrend: A Look Into The 2022-23 Cybersecurity Budget Benchmark Summary

In a recent publication, the 2023 Security Budget Benchmark Summary Report by IANS Research and Artico Search shed light on the prevailing trends in cybersecurity spending during the 2022-23 budget cycle. The findings reflect a notable 65% reduction in growth, painting a picture of cautious or restrained budgetary allocations towards cybersecurity across various industries, especially […]

Analyzing The Downtrend: A Look Into The 2022-23 Cybersecurity Budget Benchmark Summary Read More »

Boise State’s Cyberdome marks successful first year in cybersecurity

Boise State University’s Cyberdome initiative, in partnership with Stellar Cyber, has marked its first year of operation as a resounding success. The programme, which is part of Boise State’s Institute for Pervasive Cybersecurity, aims to offer top-notch cybersecurity services to rural areas in Idaho, while also providing invaluable hands-on experience to students. Edward Vasko, director

Boise State’s Cyberdome marks successful first year in cybersecurity Read More »

Google to bolster phishing and malware delivery defenses in 2024

Google will introduce new sender guidelines in February to bolster email security against phishing and malware delivery by mandating bulk senders to authenticate their emails and adhere to stricter spam thresholds. “Last year, we started requiring that emails sent to a Gmail address must have some form of authentication,” said Neil Kumaran, Group Product Manager

Google to bolster phishing and malware delivery defenses in 2024 Read More »

Majority believe malicious AI will circumvent cybersecurity: Enea

Majority believe malicious AI will circumvent cybersecurity: Enea

76% of cybersecurity professionals believe the world is very close to encountering malicious artificial intelligence (AI) that can bypass most known cybersecurity measures. Over a quarter (26%) see this happening within the next year, and 50% in the next five years.  Phishing, social engineering tactics, and malware attacks are those most likely to become more

Majority believe malicious AI will circumvent cybersecurity: Enea Read More »

Check Point discovers new phishing scam on Dropbox

Check Point discovers new phishing scam on Dropbox

A new business email compromise 3.0 attack involving the file hosting service, Dropbox has been discovered by Check Point Research.  In the first two weeks of September, CPR observed 5,440 attacks, just another example of hackers masquerading behind legitimate sites with the hope of scamming unsuspecting users via social engineering tactics. Phishing via Dropbox A

Check Point discovers new phishing scam on Dropbox Read More »

Xenomorph Android malware now targets U.S. banks and crypto wallets

Xenomorph Android malware now targets U.S. banks and crypto wallets

Security researchers discovered a new campaign that distributes a new version of the Xenomorph malware to Android users in the United States, Canada, Spain, Italy, Portugal, and Belgium. Analysts at cybersecurity company ThreatFabric have been tracking Xenomorph activity since February 2022 and note that the new campaign launched in mid-August. The latest version of Xenomorph is targeting users

Xenomorph Android malware now targets U.S. banks and crypto wallets Read More »

Chatbots lower the barrier for entry into cybercrime

Chatbots lower the barrier for entry into cybercrime

The potential risk posed by AI/chatbots in cybercrime has dominated headlines recently. A new report considers how these tools are leveraged to create highly targeted phishing campaigns.   Egress, a cybersecurity company providing intelligent email security, has released its second Phishing Threat Trends Report. The report’s findings demonstrate the evolving attack methodologies used by cybercriminals that

Chatbots lower the barrier for entry into cybercrime Read More »

Ransomware acting within 24 hours of access now: Secureworks report

Ransomware Deployment Speed 24 hours of access now: Secureworks report

Rapid Ransomware Threats Demand Swift Action The latest Secureworks Threat Report highlights a startling fact: Ransomware can compromise systems in under 24 hours. Cybercriminals are advancing quickly, with half of ransomware attacks occurring on the day of initial access. Global Cyberthreats Evolve Secureworks’ Counter Threat Unit pinpoints the growth of “name and shame” tactics, where

Ransomware Deployment Speed 24 hours of access now: Secureworks report Read More »

NSA and CISA reveal top 10 cybersecurity misconfigurations

NSA and CISA reveal top 10 cybersecurity misconfigurations

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) revealed today the top ten most common cybersecurity misconfigurations discovered by their red and blue teams in the networks of large organizations. Today’s advisory also details what tactics, techniques, and procedures (TTPs) threat actors use to successfully exploit these misconfigurations with various

NSA and CISA reveal top 10 cybersecurity misconfigurations Read More »

New BunnyLoader threat emerges as a feature-rich malware-as-a-service

New BunnyLoader threat emerges as a feature-rich malware-as-a-service

Security researchers discovered a new malware-as-a-service (MaaS) named ‘BunnyLoader’ advertised on multiple hacker forums as a fileless loader that can steal and replace the contents of the system clipboard. The malware is under rapid development, with updates adding new features and bug fixes. It can currently download and execute payloads, log keys, steal sensitive data

New BunnyLoader threat emerges as a feature-rich malware-as-a-service Read More »

Scroll to Top