CEO of Data Privacy Company Onerep.com Founded Dozens of People-Search Firms

Historical domain registration records suggest that the founder of Onerep, Dimitri Shelest, has been involved in numerous people-search services, indicating potential conflicts of interest.

Human Risk Factors Remain Outside of Cybersecurity Pros’ Control

Concerns are especially high in the public sector, with 87% worrying about employee email and social media lapses damaging their institutions, according to a Mimecast report.

Key MITRE ATT&CK Techniques Used by Cyberattackers

In 2023, researchers identified new adversary techniques targeting macOS, Microsoft, and Linux users, including increased stealer activity in macOS environments, reflective code loading, and AppleScript abuse.

Report: Only 13% of Medical Devices Support Endpoint Protection Agents

About 63% of CISA-tracked known exploited vulnerabilities can be found on healthcare networks, with 23% of medical devices having at least one known exploited vulnerability, according to Claroty.

Audit Committees Rank Cybersecurity as Top Priority Amid SEC Crackdown

Audit committees rank cybersecurity as their top oversight priority, the Center for Audit Quality and Deloitte found in a survey conducted as the Securities and Exchange Commission pushed forward with strict rules on cyberattack disclosure.

Threat Actors are Turning to Novel Malware as Malicious Attacks Rise

A new report by BlackBerry revealed that 62% of industry-related cyberattacks from September to December 2023 were directed at critical infrastructure providers. The use of novel malware saw a 27% increase.

New Report Suggests Surge in SaaS Assets, Employee Data Sharing

Security researchers at DoControl observed a significant rise in software-as-a-service (SaaS) assets, with an average of 286,000 new assets generated weekly in 2023, representing an 189% surge from the previous year.

WEF Effort to Disrupt Cybercrime Moves Into Operations Phase

The Cybercrime Atlas initiative, a collaborative effort involving law enforcement agencies, private-sector firms, and other organizations, aims to disrupt cybercriminals by mapping out relationships between criminal groups and their infrastructure.

SIM Swappers Hijacking Phone Numbers in eSIM Attacks

Cybercriminals are bypassing traditional SIM swapping methods by exploiting vulnerabilities in eSIM activation processes and using stolen credentials to initiate the porting of phone numbers to their own devices.

JetBrains Vulnerability Exploitation Highlights Debate Over ‘Silent Patching'

Rapid7's decision to release details on the vulnerabilities led to immediate exploitation by attackers, according to JetBrains. The dispute arose from Rapid7's objection to JetBrains' preference for private patch releases and silent patching.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags