fbpx

Cybersecurity & IT Threats

Expanding ‘IT Threats’ to include various aspects of cybersecurity, not just threats.

Iranian hackers backdoor 34 orgs with new Sponsor malware

Iranian hackers backdoor 34 orgs with new Sponsor malware

A nation-state threat actor known as ‘Charming Kitten’ (Phosphorus, TA453, APT35/42) has been observed deploying a previously unknown backdoor malware named ‘Sponsor’ against 34 companies around the globe. One of the notable features of the Sponsor backdoor is that it hides its otherwise innocuous configuration files on the victim’s disk so they can be discreetly […]

Iranian hackers backdoor 34 orgs with new Sponsor malware Read More »

NCC Group reveals Cl0p ransomware attack continues to dominate

NCC Group reveals Cl0p ransomware attack continues to dominate

July 2023 saw record levels of ransomware attacks carried out, with 502 observed by NCC Group’s Global Threat Intelligence team throughout the month. The findings mark a 154% increase year-on-year (198 attacks in July 2022), and a 16% rise on the previous month (434 attacks in June 2023).  Cl0p continues to dominate following MOVEit exploitation 

NCC Group reveals Cl0p ransomware attack continues to dominate Read More »

Protecting Your Microsoft IIS Servers Against Malware Attacks

Protecting Your Microsoft IIS Servers Against Malware Attacks

Microsoft Internet Information Services (IIS) is a web server software package designed for Windows Server. Organizations commonly use Microsoft IIS servers to host websites, files, and other content on the web. Threat actors increasingly target these Internet-facing resources as low-hanging fruit for finding and exploiting vulnerabilities that facilitate access to IT environments. Recently, a slew

Protecting Your Microsoft IIS Servers Against Malware Attacks Read More »

Claroty's 2023 Global Healthcare Cybersecurity Study Exposes Widespread Vulnerabilities And Impact

Claroty’s 2023 Global Healthcare Cybersecurity Study Exposes Widespread Vulnerabilities And Impact

Claroty’s 2023 Global Healthcare Cybersecurity Study Exposes Widespread Vulnerabilities and Impact By   ISBuzz Team Writer , Information Security Buzz | Aug 31, 2023 06:49 am PST Claroty, in its 2023 Global Healthcare Cybersecurity Study, unveils unsettling revelations about the state of cybersecurity within the healthcare sector. This independent, global survey involves 1,100 professionals in various roles

Claroty’s 2023 Global Healthcare Cybersecurity Study Exposes Widespread Vulnerabilities And Impact Read More »

How New SEC Rules Can Benefit Cybersecurity Teams

How New SEC Rules Can Benefit Cybersecurity Teams

The recent adoption of cybersecurity disclosure rules by the Securities and Exchange Commission (SEC) ushers in a transformative era for public companies. Under the updated regulations, the latest revision to Form 8-K emphasizes the importance of collaboration between a company’s internal and external stakeholders. This amendment requires the prompt disclosure of “material cybersecurity incidents” through

How New SEC Rules Can Benefit Cybersecurity Teams Read More »

Cybersecurity on a budget – what SMEs need to know

Cybersecurity on a budget – what SMEs need to know

For small and medium-sized enterprises (SMEs), the major shift to remote and hybrid working has significantly raised the cybersecurity stakes. Now more than ever, small IT teams must often wear multiple hats, tasked with ensuring networks and IT systems to perform without problems while keeping data safe from a broadening range of complex cyber threats.  Adding

Cybersecurity on a budget – what SMEs need to know Read More »

Honeywell acquires cybersecurity provider to address manufacturing’s IoT vulnerabilities | VentureBeat

Honeywell acquires cybersecurity provider to address manufacturing’s IoT vulnerabilities | VentureBeat

Head over to our on-demand library to view sessions from VB Transform 2023. Register Here The manufacturing sector is rife with unprotected Internet of Things (IoT) sensors and devices, many of them integrated into enterprises’ mission-critical systems. The resulting gaps make operations technology (OT) and information technology (IT) networks vulnerable to devastating cyberattacks. Visibility is

Honeywell acquires cybersecurity provider to address manufacturing’s IoT vulnerabilities | VentureBeat Read More »

CyberArk unveils AI Center of Excellence for cybersecurity

CyberArk unveils AI Center of Excellence for cybersecurity

CyberArk, the identity security company, has announced its new Artificial Intelligence Center of Excellence details. “Drawing upon years of utilising artificial intelligence (AI) and machine learning (ML) technology across the CyberArk Identity Security Platform, CyberArk is expanding R&D and product development resources to advance the use of generative AI to improve security for its more

CyberArk unveils AI Center of Excellence for cybersecurity Read More »

How SMEs can use Wazuh to improve cybersecurity

How SMEs can use Wazuh to improve cybersecurity

Cybersecurity has become a crucial concern for businesses of all sizes and sectors in today’s digital era. Cyber attacks are becoming more frequent and intricate, making it difficult for companies to safeguard themselves against data breaches, malware infections, and other malicious activities. Small and medium-sized enterprises (SMEs) are especially susceptible as they usually lack the

How SMEs can use Wazuh to improve cybersecurity Read More »

Google Cloud Introduces Duet AI To Revolutionize Cybersecurity Operations

Google Cloud Introduces Duet AI To Revolutionize Cybersecurity Operations

Cybersecurity remains a top concern for organizations, given the growing frequency and sophistication of cyber threats. Google Cloud is taking unprecedented steps to confront these challenges head-on, unveiling innovations that leverage artificial intelligence (AI) for enhanced security. These announcements were made at the recent Google Cloud Next event. Leveraging AI to Tackle Security Challenges Google

Google Cloud Introduces Duet AI To Revolutionize Cybersecurity Operations Read More »

Scroll to Top