Nation-state attackers pose a growing cybersecurity threat driven by specific geopolitical or economic objectives. These actors often target organizations with valuable data, using advanced techniques such as reconnaissance, said Ryan Roobian, global solutions architect, Google Cloud.
A threat actor with suspected ties to Russian nation-state hackers has listed thousands of IoT devices as proxy networks within minutes of their initial compromise. A campaign that began in 2020 has so far infected 20,000 IoT devices, according to a new report by Trend Micro.
Bitsight's $115 million acquisition of Cybersixgill will merge automated threat intelligence with risk exposure tools. This strategic move reflects the growing demand for streamlined cybersecurity solutions and aligns with Bitsight's mission to enhance cyber-risk management.
In the latest weekly update, ISMG editors explored the growing threat of disrupted ransomware attacks as a public health crisis, the potential global impact of a Donald Trump's second presidential term, and implications of the latest big merger in the cybersecurity market.
Godzilla webshell, a Chinese-language backdoor known for its stealth and ability to execute commands and manipulate files, is publicly available on GitHub, and federal authorities have issued a stern warning to the healthcare sector to prepare for this threat and inevitable cyberattacks.
SoftBank-backed merger between Trustwave and Cybereason brings together leading MDR, EDR, DFIR and threat intelligence capabilities. The combined organization aims to improve AI-driven detection and enhance Microsoft E5 support, targeting enterprise, mid-market, and public sector clients worldwide.
Federal authorities are warning the healthcare sector of an array of cyberthreats - including Scattered Spider hacks, living-off-the-land attacks, and bad actors looking to exploit weaknesses such as F5 misconfigurations and also so-called "Miracle Exploit" flaws in some Oracle software.
As India accelerates its digital transformation journey, the lack of security-by-design principles in its expanding digital infrastructure has created unprecedented cybersecurity risks, particularly affecting financial services and healthcare sectors, according to Cybersecurity Expert Kanishk Gaur.
Cyberattacks are evolving at unprecedented speed, scale and sophistication. When every second counts, you need an experienced cybersecurity partner that can help you mitigate and recover from an attack quickly and effectively.
Unit 42® is proud to be recognized as a Leader in The Forrester Wave™: Cybersecurity...
The ever-expanding threat landscape keeps evolving, and it is easy to overlook key areas that could expose your organization. However, you can stay ahead of constantly evolving threats and gain peace of mind with this comprehensive checklist.
These recommendations, abstracted from the latest 2022 Unit 42 Incident...
Join our upcoming webinar where we will delve into critical challenges like managing data overload, ensuring contextual relevance, achieving real-time visibility, and fostering secure collaboration. We’ll explore innovative approaches, including the integration of advanced threat intelligence frameworks, methods for...
Cryptocurrency-seeking hackers are increasingly targeting macOS users. So warn security researchers as they track a rise in macOS backdoors and information-stealing malware, much of which traces back to a well-known cryptocurrency heist culprit: North Korea.
Filigran’s $35 million Series B funding, led by Insight Partners, positions the company to scale its threat intelligence and proactive security capabilities while expanding its U.S. footprint. Plans include doubling the engineering team and strengthening breach and attack simulation capabilities.
This 2024 threat-hunting report, highlights the trends observed in the past 12 months. Also, it talks about how to utilize proactive, intelligence-informed threat hunting to relentlessly track, detect, and ultimately disrupt the adversary no matter when or where they operate.
Learn how modern adversaries are...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.