Cyberattack Strikes the Grand Palais RMN; Impact Appears Limited – Dark Reading
Everyone expected some kind of cyberattack during the Olympics. If this is the best they’ve got, the bad guys don’t deserve a spot on the podium. – Read More
Everyone expected some kind of cyberattack during the Olympics. If this is the best they’ve got, the bad guys don’t deserve a spot on the podium. – Read More
The threat landscape moves fast. As new attack methods and social engineering techniques appear, organizations need to maintain security awareness programs that are relevant, agile and focused. Research from Proofpoint…
Background Last year, the Federal Trade Commission (FTC) received more than 330,000 reports of business impersonation scams and nearly 160,000 reports of government impersonation scams. This represents about half of…
What happened Proofpoint recently identified a cluster of activity conducting malicious email campaigns using piano-themed messages to lure people into advance fee fraud (AFF) scams. The campaigns have occurred since…
Generative artificial intelligence (GenAI) tools like ChatGPT have extensive business value. They can write content, clean up context, mimic writing styles and tone, and more. But what if bad actors…
The most damaging cyber threats today don’t target machines or systems—they target humans. Today, 74% of data breaches rely on exploiting the human element. From employees clicking on malicious links…
When you hear the term “spoofed” email, does business email compromise (BEC) come to mind? It does for many people—especially security leaders. BEC is a form of email fraud, and…
Hacker Summer Camp opens in Las Vegas this week with talks on cloud security, supply chain threats, and artificial intelligence at the fore of presentations at BSides LV, Black Hat…
At least two Russian nationals serving prison sentences for cybercrime offenses, Vladislav Klyushin and Roman Seleznev, were released as part of the landmark prisoner swap. – Read More
The RaaS group that distributes Hive ransomware delivers new malware impersonating as validly signed network-administration software to gain initial access and persistence on targeted networks – Read More
INTERPOL said it devised a “global stop-payment mechanism” that helped facilitate the largest-ever recovery of funds defrauded in a business email compromise (BEC) scam. The development comes after an unnamed…
Cybersecurity startup RAD Security, a finalist in this year’s Black Hat USA Startup Spotlight competition, looks for “drift events,” or events that vary from the baseline. – Read More
API security provider Cequence has added new large language model (LLM) threat detection and management capabilities along with some fresh integrations for API discovery on its Unified API protection (UAP)…
The AI boom and increasing popularity of quantum computing necessitates quantum-resilient security. – Read More
Cybersecurity giant CrowdStrike has been caught in a torrent of bad news since an errant content configuration update on July 19 sparked a massive IT outage that affected thousands of…