The Best End User Security Awareness Programs Aren’t About Awareness Anymore – Dark Reading
The goal is to apply psychology principles to security training to change behaviors and security outcomes. – Read More
The goal is to apply psychology principles to security training to change behaviors and security outcomes. – Read More
Researchers find it takes far less to manipulate a large language model’s (LLM) behavior than anyone previously assumed. – Read More
Hardcoded credentials, access tokens, and API keys are ending up in the darnedest places, prompting a call for organizations to stop over-privileging secrets. – Read More
NSO Group must pay $4 million in damages and is permanently prohibited from reverse-engineering WhatsApp or creating new accounts after targeting users with spyware. – Read More
Financial regulators in Canada this week levied $176 million in fines against Cryptomus, a digital payments platform that supports dozens of Russian cryptocurrency exchanges and websites hawking cybercrime services. The…
The Iranian nation-state group known as MuddyWater has been attributed to a new campaign that has leveraged a compromised email account to distribute a backdoor called Phoenix to various organizations…
Cybersecurity researchers have disclosed details of a coordinated spear-phishing campaign dubbed PhantomCaptcha targeting organizations associated with Ukraine’s war relief efforts to deliver a remote access trojan that uses a WebSocket…
In this product demonstration, Paul Wilson, director of customer success at Aiden Technologies walks us through Aiden’s technology stack and how their solution is designed to automate the entire lifecycle…
Thanks to improving cybersecurity and law enforcement action from the West, Russia’s government is reevaluating which cybercriminals it wants to give safe haven from the law. – Read More
The Iranian threat group is using a compromised mailbox accessed through NordVPN to send phishing emails that prompt recipients to enable macros. – Read More
Thomson Reuters today (22 October) announced a new partnership with AI search engine DeepJudge, which will enable law firms to combine CoCounsel research with their own work product. DeepJudge, founded…
Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft SharePoint to breach a telecommunications company in the Middle East after it was publicly disclosed and patched…
Scammers have begun impersonating outreach from Google’s “Careers” division to trick targets into giving away their credentials. According to a Sublime Security finding, the attackers are sending messages that appear…
Russian state-backed hackers are using fake “I am not a robot” CAPTCHA pages to deliver new strains of espionage malware, according to Google Cloud’s Threat Intelligence Group (GTIG), marking a…
From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed cloud asset. Within hours, five different tools alert you about it: your vulnerability scanner,…