IdentityExperts say MFA is no longer enough for enterprisesShaun NicholsOctober 11, 2024The UK’s cyber watchdog says that companies need to be more mindful with how they handle their multi-factor authentication.
RansomwareLynx ransomware analyses reveal similarities to INC RansomLaura FrenchOctober 11, 2024The newer ransomware-as-a-service group has claimed more than 20 victims since July 2024.
RansomwareFog, Akira ransomware groups exploit critical Veeam backup flawSteve ZurierOctober 11, 2024Veeam disclosed the flaw and issued patches in September.
AI/MLOpenAI reveals ChatGPT use by CyberAv3ngers, Android malware developersLaura FrenchOctober 10, 2024More than 20 adverse operations were interrupted by OpenAI in 2024, a new report revealed.
Network SecurityRaccoon infostealer mastermind pleads guilty in US courtShaun NicholsOctober 10, 2024A 28-year-old Ukranian man admitted to being the mastermind behind one of the most notorious pieces of malware on the internet.
Data SecurityFidelity Investments confirms August breach affected 77K customersSteve ZurierOctober 10, 2024Fidelity maintains that there’s no indication of a ransomware incident – and that no funds were stolen.
AI/MLLLM attacks take just 42 seconds on average, 20% of jailbreaks succeedLaura FrenchOctober 9, 2024Successful LLM attacks result in sensitive data leakage 90% of the time, a Pillar Security study found.
Network SecurityThree critical flaws highlight Patch Tuesday in OctoberShaun NicholsOctober 9, 2024Microsoft has kicked out a whopping 117 patches this week in its monthly patch update
Cloud SecuritySharePoint, OneDrive and Dropbox targeted by BEC attacksSteve ZurierOctober 9, 2024Threat actors step up BEC attacks that rely on sophisticated evasion techniques that result in financial fraud, data loss, and lateral movement.
Vulnerability ManagementSiemens device PIN susceptible to remote brute-force in older modelLaura FrenchOctober 9, 2024No fix is planned for the SENTRON 7KM PAC3200 flaw that could give an attacker admin access to the device.
Four SOC 2 compliance best practices for any organization that handles cloud-based dataShira ShambanOctober 9, 2024