Articles tagged: threat-intelligence
10 articles found

Vulnerability Triage Evolves with Brocards
A new approach to vulnerability triage, called Brocards, has been introduced to help organizations manage vulnerabilities more effectively. Learn about the importance of proactive vulnerability management and how to implement a comprehensive program. Effective vulnerability triage involves prioritizing vulnerabilities based on their potential impact and likelihood of exploitation.

US Industrial Devices Under Attack
The US faces significant cybersecurity threats as nearly 4,000 industrial devices are exposed to Iranian cyberattacks, and recent data breaches highlight the need for robust security measures. These incidents pose a risk to critical infrastructure networks and sensitive personal health information.

Emerging Threats: Emoji-Based Attacks and Patched Vulnerabilities
Threat actors are using emojis to evade detection, while cybercriminals target accountants to drain Russian firms' bank accounts. Meanwhile, Palo Alto Networks and SonicWall have patched high-severity vulnerabilities. Learn about these emerging threats and how to protect yourself.

Ransomware and Crypto Exchange Hacks Surge
A surge in ransomware claims and crypto exchange hacks poses a significant threat to cybersecurity. Over 7,655 ransomware claims were reported in the past year, while a hacker stole $53 million from the Uranium crypto exchange. Learn how to protect yourself from these threats.

US Shifts Cyber Strategy to Offense
The White House has released a new cyber strategy document prioritizing offense and preemption. This shift may impact cybersecurity professionals and organizations. Learn about the implications and recommendations.

AI-Driven Cyber Threats Escalate
Microsoft reports hackers are abusing AI in cyberattacks, while OpenAI's Codex Security and Anthropic's AI model identify thousands of vulnerabilities. Learn how AI is changing the cybersecurity landscape and what you can do to protect yourself.

Hackers Abuse .arpa Domain and IPv6 to Evade Phishing Defenses
Threat actors are using the .arpa domain and IPv6 reverse DNS to bypass traditional security controls in phishing campaigns. This new evasion technique poses a significant threat to organizations, highlighting the need for improved defenses. Learn how to protect your organization from these sophisticated attacks.

Phishing and Cybercrime Surge
A recent surge in phishing and cybercrime activities has highlighted the vulnerability of IoT devices and the importance of robust security measures. The hacking of the MyFirst Kids Watch and the bust of the Tycoon 2FA phishing platform underscore the need for increased vigilance. Read on to learn more about these threats and how to protect yourself.
Zero-Day AI Threats and Cloud Security Updates
Critical zero-day vulnerabilities in AI systems pose significant threats, while cloud security enhancements offer new protections. Learn about the latest developments and how to stay secure.

Ransomware Payments Plummet Amidst Rising Attacks
Despite a surge in ransomware attacks, payments to threat actors have reached an all-time low. Recent incidents include the breach of Olympique Marseille and a lawsuit against SonicWall. Learn about the evolving landscape of ransomware threats and how to defend against them.