Network SecurityCorrupted Microsoft Office documents used in phishing campaignLaura FrenchDecember 2, 2024The corrupted files evade security systems but are easily recovered to deliver phishing links.
Women in IT SecurityTia Hopkins on diversity, resilience, and redefining leadership (video)SC StaffDecember 2, 2024eSentire’s Chief Cyber Resilience Officer discusses her journey, the importance of mentorship, and how inclusivity and innovation are shaping the future of cybersecurity.
IdentityMicrosoft 365 credentials stolen via adversary-in-the-middle campaignSteve ZurierDecember 2, 2024Threat actor uses leveraging the Rockstar 2FA phishing-as-a-service and bypasses MFA.
AI/MLAI viewed as phishing threat as well as defense, in new surveyShaun NicholsNovember 27, 2024Respondents to CyberRisk Alliance survey had favorable view of AI in cybersecurity.
Ransomware‘Tis the season for website cloning tools, RCEs and AI phishing luresSteve ZurierNovember 27, 2024Security pros warn retailers to monitor APIs for irregularities to guard against sudden price fluctuations or inventory control issues.
RansomwareRansomware attack on Blue Yonder disrupts retailers ahead of holidaysLaura FrenchNovember 27, 2024Starbucks, Sainsbury and Morrisons are among the companies affected by the supply chain attack.
RansomwareCyberVolk analysis explores ransomware, hacktivism interconnectionsLaura FrenchNovember 26, 2024Several intertwined pro-Russia groups use their political stance to justify extorting governments.
Network SecurityFeds seek to grill Kansas City man with hacking chargesShaun NicholsNovember 26, 2024A man from Kansas City could be smoked after he was indicted on criminal hacking charges.
Data SecurityNew York fines GEICO and Travelers $11.3 million in data breach casesSteve ZurierNovember 26, 2024In settling the two breach cases, the auto insurers also agreed to deploy cybersecurity best practices.
RansomwareGrowth in phishing, changes in ransomware crews mark threat landscapeShaun NicholsNovember 26, 2024Phishing attacks continue to dominate the security landscape, though other avenues for cybercrime are seeing growth in popularity.