CSO Online

Unique TTPs link Hades ransomware to new threat group

Researchers claim to have discovered the identity of the operators of Hades ransomware, exposing the distinctive tactics, techniques, and procedures (TTPs) they employ in their attacks.

Coca-Cola trade secret theft underscores importance of insider threat early detection

A research engineer used basic exfiltration techniques to steal trade secrets from Coca-Cola, but wasn't caught until she attempted to steal similar data from another company.

Booming dark web gig economy is a rising threat

Breaking a regular website usually costs below $10,000, while custom databases are priced between $100 and $20,000, or between $5 and $50 per 1,000 entries, a Positive Technologies report said.
February 2, 2021

Sprite Spider emerging as one of the most destructive ransomware threat actors

Today Sprite Spider is poised to become one of the biggest ransomware threat actors of 2021 and has a threat profile on par with what advanced persistent threat actors were five or ten years ago.

How attackers exploit QR codes and how to mitigate the risk

A research report released by mobile security platform provider MobileIron in September 2020 shows that QR codes pose “significant” security risks for enterprises and end-users.

Revised DOJ compliance guidance offers risk-management lessons for cybersecurity leaders

The risk management guidance that the DOJ puts out could prove useful to cybersecurity executives.

Cyber LEAP Act aims for innovations through Cybersecurity Grand Challenges

The challenges set up under the legislation will offer prizes, including cash and non-cash prizes, to competition winners, although the prizes aren’t yet spelled out.

Cisco and Palo Alto Networks appliances impacted by Kerberos authentication bypass

Man-in-the-middle (MitM) attackers could exploit these weaknesses to get administrative control over the vulnerable appliances.

Threat modeling explained: A process for anticipating cyber attacks

Threat modeling is a structured process through which IT pros can identify potential security threats, quantify the seriousness of each, and prioritize techniques to mitigate attacks.

AI-powered deception technology speeds deployment, improves results

Formerly known as honeypots, deception technologies sprinkle the environment with fake "accidentally leaked" credentials, decoy databases, and mock servers that are invisible to legitimate users.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags