Tech Target

Iranian Cyberattacks Targeting U.S. and Israeli Entities

Iranian state-backed actors have consistently targeted the U.S. and Israel with cyberattacks, including destructive malware and influence campaigns, before and after the Israel-Hamas war.

Cohesity, Veritas Combine as New Data Protection Company

The deal will result in the formation of a separate company called DataCo to handle Veritas' remaining assets, while Cohesity will follow a "no customer left behind" approach.

Linux Foundation Announces Post-Quantum Cryptography Alliance

The Post-Quantum Cryptography Alliance aims to drive the adoption of post-quantum cryptography to address security risks posed by quantum computing, with support from industry leaders like Google, IBM, Amazon Web Services, and Cisco.

SonicWall Acquires Banyan to Boost Zero-Trust, SSE Offerings

With its second acquisition in two months, SonicWall aims to help enterprises with growing remote workforces through zero-trust network and security service edge offerings.

Researchers Disclose Zero-Click Exploit for Microsoft Outlook

The vulnerabilities, CVE-2023-35384 and CVE-2023-36710, allow an attacker to bypass security measures and execute code on a victim's machine by tricking Outlook into downloading a specially crafted sound file.

Cryptocurrency Wallets Might be Vulnerable to ‘Randstorm’ Flaw in Bitcoin JavaScript Library

The vulnerability, known as "Randstorm," is a result of programming mistakes and weaknesses in random number generation in the BitcoinJS library, making Bitcoin private keys more vulnerable to attacks.

Developer Platform Retool Breached in Vishing Attack

A threat actor impersonating an IT staff member conducted SMS-based phishing and a successful vishing attack to obtain authentication logins that led to the total account takeover of one Retool employee.

SEC Cyber Incident Reporting Regulations Prompt 10 Questions for CISOs

Board members must have a strong grasp of the cybersecurity landscape and ask their CISOs critical questions about cyber risk and management to comply with SEC regulations.

May ransomware activity rises behind 8base, LockBit gangs

LockBit was the most active group last month, but NCC Group researchers were surprised by 8base, which started listing victims from attacks that occurred beginning in April 2022.

Vendors say threat actor taxonomies are confusing but essential

The number of unique threat actor taxonomies, which results in overlapping names for the same cyber adversaries, may be confusing to clients. But vendors argue such systems are key to maintaining accurate threat tracking and defense procedures.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags