US pipeline ransomware attack serves as fair warning to persistent corporate inertia over security

That companies continue to disregard the need for basic cybersecurity hygiene signals the need for firmer action, especially as cybercriminals turn their focus to operational technology sectors.

Cyber expert asks Flipkart users to reset passwords to avoid fraud

According to Rajashekhar Rajaharia, cybercriminals are selling credentials of customers from allegedly leaked databases of BigBasket that match with accounts of e-commerce firm Flipkart and Amazon.

Navigating the waters of maritime cybersecurity

Earlier this year, the U.S. government released a first of its kind National Maritime Cyber Security Plan (NMCP), accompanying recent maritime cybersecurity directives from the U.S. Coast Guard.

Why threat hunting is obsolete without context

Threat hunting is implemented by IT professionals to find dormant or active threats on their network to better understand and harness network visibility and threat actor entry points.

Newer Generic Top-Level Domains a Security 'Nuisance'

A study into the use and popularity of the Internet's TLDs over a 10-year period shows that many newer TLDs may present more of a security nuisance for organizations than anything else.

Shedding light on the threat posed by shadow admins

If threat actors take control of one of these accounts, they can extend their attack in many ways, perhaps seeking opportunities for lateral movement or privilege escalation whilst staying incognito.

Deepfakes Are Getting Closer to Reality

Several positive steps continue to be taken by organizations such as the European Union and the U.S. FTC to curb possible malicious uses and abuses of AI via new regulations.

Attackers can teach you to defend your organization against phishing

Using the kill chain to assess how an attacker would approach your organization makes it easier to understand which steps would need to be taken by an attacker to succeed in a phishing attack.

$2 trillion can build a lot of infrastructure. But can the U.S. secure it?

President Joe Biden wants to pour trillions of dollars into upgrading US' roads, ports and schools, but his infrastructure plan has a missing piece: protecting the technology in those new projects.

GraphQL APIs rev up innovation – but also introduce a potential security nightmare

It should come as no surprise that businesses have glommed onto the data sharing and monetizing benefits of APIs while overlooking the security ramifications of APIs left unprotected.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags