Cyber Blog News(479) - 2024 2023 2022 2021 2020 2019 2018
APT blog Attack blog BigBrother blog BotNet blog Cyber blog Cryptocurrency blog Exploit blog Hacking blog ICS blog Incident blog IoT blog Malware blog OS Blog Phishing blog Ransom blog Safety blog Security blog Social blog Spam blog Vulnerebility blog
DATE | NAME | Info | CATEG. | WEB |
11.10.25 |
Cyber Threats in the EU Escalate as Diverse Groups Target Critical Sectors | The 2025 ENISA Threat Landscape shows rising cyber threats in the EU, with DDoS, ransomware, phishing, and supply chain attacks on critical infrastructure. | Cyber blog | Cyble |
11.10.25 |
Australian Data Breaches Are Up 48% So Far This Year. What’s Behind The Eye-Popping Surge? | Australian data breaches have surged 48% so far this year, the latest data point that suggests that threat actors are finding rich targets Down Under. | Cyber blog | Cyble |
11.10.25 |
Cybersecurity Awareness Month 2025: Don’t Just Be Aware, Be Ahead | This Cybersecurity Awareness Month, it’s time to move beyond awareness. Organizations face AI-powered attacks, supply chain vulnerabilities, and brand threats that demand proactive defense strategies—not just reactive responses. | Cyber blog | Cyble |
11.10.25 |
CYBER THREAT LANDSCAPE REPORT – Saudi Arabia | Executive Summary In 2025, Saudi Arabia witnessed a notable rise in cybercriminal activity, particularly within the dark web landscape. Threat actors increasingly targeted key sectors, | Cyber blog | Cyfirma |
11.10.25 |
CYBER THREAT LANDSCAPE REPORT – UNITED ARAB EMIRATES UAE | Executive Summary In 2025, the United Arab Emirates (UAE) experienced a significant surge in cybercriminal activity, particularly in the dark web ecosystem. Threat actors targeted | Cyber blog | Cyfirma |
11.10.25 |
Why don’t we sit around this computer console and have a sing-along? | Martin muses on why computers are less fun than campfires, why their dangers seem less real, and why he’s embarking on a lengthy research project to study this. | Cyber blog | CISCO TALOS |
11.10.25 |
What to do when you click on a suspicious link | As the go-to cybersecurity expert for your friends and family, you’ll want to be ready for those “I clicked a suspicious link — now what?” messages. Share this quick guide to help them know exactly what to do next. | Cyber blog | CISCO TALOS |
11.10.25 |
Too salty to handle: Exposing cases of CSS abuse for hidden text salting | A simple yet effective tactic, known as hidden text salting, is increasingly used by cybercriminals over the past few months to evade even the most advanced email security solutions, including those powered by machine learning and large language models. | Cyber blog | CISCO TALOS |
4.10.25 | Protecting software-as-a-service (SaaS) platforms and applications requires a comprehensive security strategy. Drawing from analysis of UNC6040’s specific attack methodologies, this guide presents a structured defensive framework encompassing proactive hardening measures, comprehensive logging protocols, and advanced detection capabilities. | Cyber blog | Google Threat Intelligence | |
4.10.25 | CYBER THREAT ASSESSMENT ON NIGERIA | EXECUTIVE SUMMARY Between January and September 2025, Nigeria experienced a surge in data breaches and cybercrime activities across banking, telecom, government, healthcare, | Cyber blog | Cyfirma |
4.10.25 | The Hunt for RedNovember: A Depth Charge Against Network Edge Devices | Network edge devices such as routers, switches, firewalls, VPNs, and access points are being targeted by waves of cyberattacks. | Cyber blog | Eclypsium |
4.10.25 | UAT-8099: Chinese-speaking cybercrime group targets high-value IIS for SEO fraud | Cisco Talos is disclosing details on UAT-8099, a Chinese-speaking cybercrime group mainly involved in SEO fraud and theft of high-value credentials, configuration files, and certificate data. | Cyber blog | CISCO TALOS |
4.10.25 | Family group chats: Your (very last) line of cyber defense | Amy gives an homage to parents in family group chats everywhere who want their children to stay safe in this wild world. | Cyber blog | CISCO TALOS |
4.10.25 | What happens when you engage Cisco Talos Incident Response? | What happens when you bring in a team of cybersecurity responders? How do we turn chaos into control, and what is the long-term value that Talos IR provides to the organizations we work with? | Cyber blog | CISCO TALOS |
4.10.25 | Manufacturing under fire: Strengthening cyber-defenses amid surging threats | Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging | Cyber blog | Eset |
4.10.25 | Cybersecurity Awareness Month 2025: Knowledge is power | We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals | Cyber blog | Eset |
4.10.25 | This month in security with Tony Anscombe – September 2025 edition | The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans | Cyber blog | Eset |
27.9.25 | Australia Urges Immediate Action on Post-Quantum Cryptography as CRQC Threat Looms | ACSC urges early action as CRQC threatens current encryption. Organizations must adopt post-quantum cryptography by 2030 to protect critical data. | Cyber blog | Cyble |
27.9.25 | Countdown to DPDP Rules: What to Expect from the Final DPDP Rules | The wait is almost over. The final Digital Personal Data Protection (DPDP) Rules are just days away, marking the next big step after the enactment of the DPDPA in 2023. With only a few days left, organizations must gear... | Cyber blog | Seqrite |
27.9.25 | Why Regional and Cooperative Banks Can No Longer Rely on Legacy VPNs | Virtual Private Networks (VPNs) have been the go-to solution for securing remote access to banking systems for decades. They created encrypted tunnels for employees, vendors, and auditors to connect with core banking applications. But as cyber threats become more... | Cyber blog | Seqrite |
27.9.25 | CYBER THREAT LANDSCAPE- SOUTH AFRICA | Executive Summary South Africa’s cyber threat landscape has intensified sharply in 2025, reflecting the country’s position as Africa’s most digitally integrated economy and a prime targe | Cyber blog | Cyfirma |
27.9.25 | Qatar Threat Landscape Report | Executive Summary In this report, our researchers analysed recent cyber activity targeting Qatar, including data leaks, the sale of initial access, and ransomware incidents. We explain | Cyber blog | Cyfirma |
27.9.25 | From MUSE to Manual: Cyberattack Analysis on European Airport Operations | Executive Summary On 19 September 2025, multiple major European airports, including London Heathrow (LHR), Brussels (BRU), and Berlin Brandenburg (BER), experienced severe | Cyber blog | Cyfirma |
27.9.25 | CNAPP is the Solution to Multi-cloud Flexibility | Cloud-native application protection platform (CNAPP) not only helps organizations protect, but offers the flexibility of multi-cloud. | Cyber blog | Trend Micro |
27.9.25 | Great Scott, I’m tired | Hazel celebrates unseen effort in cybersecurity and shares some PII. Completely unrelated, but did you know “Back to the Future” turns 40 this year? | Cyber blog | CISCO TALOS |
27.9.25 | What happens when you engage Cisco Talos Incident Response? | What happens when you bring in a team of cybersecurity responders? How do we turn chaos into control, and what is the long-term value that Talos IR provides to the organizations we work with? | Cyber blog | CISCO TALOS |
27.9.25 | Put together an IR playbook — for your personal mental health and wellbeing | This edition pulls the curtain aside to show the realities of the VPN Filter campaign. Joe reflects on the struggle to prevent burnout in a world constantly on fire. | Cyber blog | CISCO TALOS |
27.9.25 | Alex Ryan: From zero chill to quiet confidence | Discover how a Cisco Talos Incident Response expert transitioned from philosophy to the high-stakes world of incident command, offering candid insights into managing burnout and finding a supportive team. | Cyber blog | CISCO TALOS |
27.9.25 | Roblox executors: It’s all fun and games until someone gets hacked | You could be getting more than you bargained for when you download that cheat tool promising quick wins | Cyber blog | Eset |
27.9.25 | When AD Gets Breached: Detecting NTDS.dit Dumps and Exfiltration with Trellix NDR | This blog describes a real-world scenario in which threat actors gained access to a system, dumped the NTDS.dit file, and attempted to exfiltrate it while avoiding common defenses. | Cyber blog | Trelix |
20.9.25 | CYFIRMA : Defence Industry Threat Report | EXECUTIVE SUMMARY Between May and August 2025, CYFIRMA observed sustained cyber operations against the global defence sector, driven by both state-aligned groups and | Cyber blog | Cyfirma |
20.9.25 | The Risks of Code Assistant LLMs: Harmful Content, Misuse and Deception | We recently looked into AI code assistants that connect with integrated development environments (IDEs) as a plugin, much like GitHub Copilot. | Cyber blog | Palo Alto |
20.9.25 | Myth Busting: Why "Innocent Clicks" Don't Exist in Cybersecurity | Picture this: You snag the last spot in a parking lot and find the QR code to pay on the lamppost directly in front of you. Score! You go to pay on the website, but wait…the page is full of ads and looks very suspicious. | Cyber blog | Palo Alto |
20.9.25 | Why a Cisco Talos Incident Response Retainer is a game-changer | With a Cisco Talos IR Retainer, your organization can stay resilient and ahead of tomorrow's threats. Here's how. | Cyber blog | CISCO TALOS |
20.9.25 | Put together an IR playbook — for your personal mental health and wellbeing | This edition pulls the curtain aside to show the realities of the VPN Filter campaign. Joe reflects on the struggle to prevent burnout in a world constantly on fire. | Cyber blog | CISCO TALOS |
20.9.25 | Alex Ryan: From zero chill to quiet confidence | Discover how a Cisco Talos Incident Response expert transitioned from philosophy to the high-stakes world of incident command, offering candid insights into managing burnout and finding a supportive team. | Cyber blog | CISCO TALOS |
20.9.25 | Maturing the cyber threat intelligence program | The Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) helps organizations assess and improve their threat intelligence programs by outlining 11 key areas and specific missions where CTI can support decision-making. | Cyber blog | CISCO TALOS |
20.9.25 | Beaches and breaches | Thor examines why supply chain and identity attacks took center stage in this week’s headlines, rather than AI and ransomware. | Cyber blog | CISCO TALOS |
20.9.25 | Dark Web Roast - August 2025 Edition | The August 2025 edition of the Advanced Research Center Dark Web Roast delivers a masterclass in how not to run a criminal enterprise, showcasing threat actors who've somehow managed to combine the worst aspects of amateur hour operations with delusions of professional grandeur. | Cyber blog | Trelix |
13.9.25 | Go Get ‘Em: Updates to Volexity Golang Tooling | This blog post was the final deliverable for a summer internship project, which was completed under the direction of the Volexity Threat Intelligence team. If you’d like more information about | Cyber blog | VELOXITY |
13.9.25 | Advanced Queries For Real Malware Detection in Silent Push | The Silent Push platform is capable of powerful queries for threat hunting and preemptive discovery of malicious infrastructure. Our team uses this platform every day to proactively hunt and discover infrastructure for our customers, enabling blocking and discovery of threats before they are fully operationalized. | Cyber blog | Silent Push |
13.9.25 | Canadian Government’s IT Arm Flags Digital Risks, Cyber Threats, and Strategic Priorities | Shared Services Canada urges IT modernization as it blocks 6.5T cyber threats yearly, highlighting urgent cybersecurity needs across federal systems. | Cyber blog | Cyble |
13.9.25 | The Rise of SBOM Requirements In Cybersecurity Guidelines and Laws | Software bills of materials (SBOMs) have been around for years, but they’re historically ill defined, hard to generate, update, and use. So most organizations don’t. | Cyber blog | Eclypsium |
13.9.25 | Golden Dome Requires Firmware Bills of Materials, SBOMs, and Other Supply Chain Security Measures | In May, 2025 the U.S. Secretary of Defense announced support for the Golden Dome for America (GDA). The project is a next-generation missile defense shield to be integrated with existing U.S. air and missile defense systems. | Cyber blog | Eclypsium |
13.9.25 | Securing Higher Education: Top College Switches from Abnormal to Proofpoint | When you represent a historic educational institution with a reputation to protect, you can’t afford gaps in email security. This is the reality for many higher education security teams. It was also the case for one liberal arts college on the East Coast that recently made the switch from Abnormal AI to Proofpoint’s API-deployed Core Email Protection. | Cyber blog | PROOFPOINT |
13.9.25 | Insider Threats Unfold in Two Ways—With Impact or Intervention | Every insider threat has a cause, whether it’s a lapse in judgment or rushed mistake, growing resentment, a change in ideology, or desire for personal gain. Left unchecked, these small cracks can widen into corporate crises that make headlines. | Cyber blog | PROOFPOINT |
13.9.25 | Data Is the New Diamond: Latest Moves by Hackers and Defenders | There have been several notable developments in recent weeks related to data theft activity from cybercriminals targeting Salesforce instances, including via the Salesloft Drift supply chain attack detailed in a recent Unit 42 Threat Brief. | Cyber blog | Palo Alto |
13.9.25 | Maturing the cyber threat intelligence program | The Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) helps organizations assess and improve their threat intelligence programs by outlining 11 key areas and specific missions where CTI can support decision-making. | Cyber blog | CISCO TALOS |
13.9.25 | Preventing business disruption and building cyber-resilience with MDR | Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy | Cyber blog | Eset |
6.9.25 | Three Critical Facts About Cyber Risk Management | For CISOs responsible for cyber risk management, these three insights will help build a strong and reliable foundation for your proactive security strategy. | Cyber blog | Trend Micro |
6.9.25 | Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust | Our research uncovered a fundamental flaw in the AI supply chain that allows attackers to gain Remote Code Execution (RCE) and additional capabilities on major platforms like Microsoft’s Azure AI Foundry, Google’s Vertex AI and thousands of open-source projects. We refer to this issue as Model Namespace Reuse. | Cyber blog | Palo Alto |
30.8.25 | Operation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa | Operation Serengeti 2.0: With Trend Micro’s support, INTERPOL led a major crackdown across Africa, arresting cybercriminals, dismantling infrastructures, recovering illicit funds, and protecting tens of thousands of victims. | Cyber blog | Trend Micro |
30.8.25 | Data Is the New Diamond: Heists in the Digital Age | Heists in the digital world may seem fundamentally different from heists in the physical world, but I see a common tie — financially motivated criminals of all types often use social engineering and intensive reconnaissance to achieve their goals. | Cyber blog | Palo Alto |
30.8.25 | Chasing the Silver Fox: Cat & Mouse in Kernel Shadows | Check Point Research (CPR) uncovered an ongoing in-the-wild campaign attributed to the Silver Fox APT which involves the abuse of a previously unknown vulnerable driver, amsdk.sys (WatchDog Antimalware, version 1.0.600). | Cyber blog | Checkpoint |
30.8.25 | This month in security with Tony Anscombe – August 2025 edition | From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news | Cyber blog | Eset |
30.8.25 | Don’t let “back to school” become “back to (cyber)bullying” | Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back | Cyber blog | Eset |
23.8.25 | The New Era of Cybercrime in Australia — AI-Powered Attacks and How to Stay Ahead | AI-driven cyberattacks are rising in Australia, with 50+ threat groups active in 2025 and a 13% spike in major incidents across key sectors. | Cyber blog | Cyble |
23.8.25 | Inside the Australian Dark Web: What Hackers Are Selling About Your Business Right Now | The Australian dark web has evolved into a booming underground economy, with rising ransomware attacks and stolen data traded openly, Cyble reports. | Cyber blog | Cyble |
23.8.25 | Cherry pie, Douglas firs and the last trip of the summer | Amy (ahem, Special Agent Dale Cooper) shares lessons from their trip to the Olympic Peninsula and cybersecurity travel tips for your last-minute adventures. | Cyber blog | CISCO TALOS |
23.8.25 | JJ Cummings: The art of controlling information | Get an inside look at how JJ Cummings helped build and lead one of Cisco Talos’ most impactful security teams, and discover what drives him to stay at the forefront of threat intelligence. | Cyber blog | CISCO TALOS |
23.8.25 | "What happens online stays online" and other cyberbullying myths, debunked | Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment. | Cyber blog | Eset |
17.8.25 | One of the most pressing cyber threats businesses face today is the rampant rise in ... | Cyber blog | Checkpoint | |
17.8.25 | A Region-Wise Breakdown of Cyber Threats: What H1 2025 Data Reveals | The Global Threat Landscape H1 2025 shows rising cyberattacks, with ransomware targeting regions like the U.S., UK, APAC, and MEA based on sectoral weaknesses. | Cyber blog | Cyble |
17.8.25 | REVENANT : EXECUTIONLESS, SELF-ASSEMBLING THREAT HIDDEN IN SYSTEM ENTROPY | EXECUTIVE SUMMARY The REVENANT project exposes a multi-stage, execution less attack methodology capable of persisting not only within endpoint and network environments, | Cyber blog | Cyfirma |
16.8.25 | Supply-chain dependencies: Check your resilience blind spot | Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them? | Cyber blog | Eset |
16.8.25 | How the always-on generation can level up its cybersecurity game | Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think | Cyber blog | Eset |
16.8.25 | Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s? | A sky-high premium may not always reflect your company’s security posture | Cyber blog | Eset |
16.8.25 | Black Hat USA 2025: Policy compliance and the myth of the silver bullet | Cyber blog | Eset | |
16.8.25 | Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow? | Cyber blog | Eset | |
16.8.25 | Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5) | Here's what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much | Cyber blog | Eset |
16.8.25 | Why the tech industry needs to stand firm on preserving end-to-end encryption | Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity | Cyber blog | Eset |
16.8.25 | This month in security with Tony Anscombe – July 2025 edition | Here's a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025 | Cyber blog | Eset |
26.7.25 | CYFIRMA Provides Cybersecurity Platform “DeCYFIR” to Takenaka Corporation for Enhanced Threat and Risk Visibility | Takenaka Corporation has defined its vision for 2030 through digital transformation and is advancing reform activities that integrate its digital division with all business units. The | Cyber blog | Cyfirma |
26.7.25 | BRB, pausing for a "Sanctuary Moon" marathon | Get to know the real people behind cybersecurity’s front lines. In this week’s newsletter, sci-fi meets reality, humanity powers technology and a few surprises are waiting to be discovered. | Cyber blog | CISCO TALOS |
26.7.25 | Meet Hazel Burton | In the first Humans of Talos, Amy sits with Hazel Burton — storyteller, security advocate, and all-around Talos legend. Hazel shares her journey from small business entrepreneurship to leading content programs at Talos. | Cyber blog | CISCO TALOS |
26.7.25 | This is your sign to step away from the keyboard | This week, Martin shows how stepping away from the screen can make you a stronger defender, alongside an inside scoop on emerging malware threats. | Cyber blog | CISCO TALOS |
26.7.25 | Why is your data worth so much? | Unlocked 403 cybersecurity podcast (S2E4) | Behind every free online service, there's a price being paid. Learn why your digital footprint is so valuable, and when you might actually be the product. | Cyber blog | Eset |
26.7.25 | Dark Web Roast - June 2025 Edition | At Trellix, we think it's important we don’t make cybercriminals seem larger than life or hero-worship them. This roast is about showing the human side of cybercrime and how they mess up, just like anyone else. | Cyber blog | Trelix |
19.7.25 | Improving Cloud Intrusion Detection and Triage with FortiCNAPP Composite | FortiCNAPP Composite Alerts link weak signals into clear timelines—helping security teams detect cloud-native threats earlier and triage them faster. | Cyber blog | FORTINET |
19.7.25 | Global Attacks Continued to Rise, But the Details Tell a Bigger Story Every quarter, Check ... | Cyber blog | Checkpoint | |
19.7.25 | Australia Strengthens Cybersecurity for Critical Infrastructure with Adoption of AS IEC 62443 Standards | Australia adopts AS IEC 62443 to secure OT systems and critical infrastructure, aligning with its national cyber strategy and six-shield cybersecurity framework. | Cyber blog | Cyble |
12.7.25 | Is Cyber the Next Stage of War in the Middle East Conflict? | As clashes continue in the Middle East, who are the cyber actors to be aware of? | Cyber blog | SYMANTEC BLOG |
5.7.25 | Numerous Western Companies May Still Need to Ban FUNNULL Admin Accounts to Comply with U.S. Treasury Sanctions | Silent Push Threat Analysts have been mapping the scope of the FUNNULL content delivery network (CDN) and its use of Infrastructure Laundering to hide its infrastructure among major Western cloud providers, such as Amazon and Microsoft, burdening defenders to remain constantly alert to respond and block its accounts. We labeled the threat actor network, “Triad Nexus.” | Cyber blog | Silent Push |
5.7.25 | EXECUTIVE THREAT LANDSCAPE REPORT AUSTRALIA | Why Cyber Threat Actors Target Australia?Why Cyber Threat Actors Target Australia?Why Cyber Threat Actors Target Australia?Why Cyber Threat Actors Target Australia?Why Cyber | Cyber blog | Cyfirma |
5.7.25 | A message from Bruce the mechanical shark | This Fourth of July, Bruce, the 25-foot mechanical shark from Jaws, shares how his saltwater struggles mirror the need for real-world cybersecurity stress testing. | Cyber blog | CISCO TALOS |
5.7.25 | How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3) | Cracking the code of cybersecurity careers starts here. What skills and mindset can set you apart? Hear from ESET's Robert Lipovsky as he reveals how to thrive in this fast-paced field. | Cyber blog | Eset |
5.7.25 | How government cyber cuts will affect you and your business | Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks | Cyber blog | Eset |
4.7.25 | How IAS is Fighting Back Against the Shape-Shifting Kaleidoscope Scheme | The IAS Threat Lab has uncovered a sophisticated new threat dubbed Kaleidoscope — a deceptive Android ad fraud operation that’s as dynamic as it is dangerous. This scheme hides behind seemingly legitimate apps available on Google Play, while malicious lookalike versions are quietly distributed through third-party app stores. | Cyber blog | INTERGRALANDS |
4.7.25 | Satori Threat Intelligence Alert: IconAds Conceals Source of Ad Fraud from Users | HUMAN’s Satori Threat Intelligence and Research Team has uncovered and disrupted an operation dubbed IconAds. This scheme centered on a collection of 352 apps which load out-of-context ads on a user’s screen and hide the app icons, making it difficult for a user to identify the culprit app and remove it. | Cyber blog | HUMANSECURITY |
28.6.25 | Cybercriminal abuse of large language models | Cybercriminals are increasingly gravitating towards uncensored LLMs, cybercriminal-designed LLMs and jailbreaking legitimate LLMs. | Cyber blog | CISCO TALOS |
28.6.25 | Getting a career in cybersecurity isn’t easy, but this can help | This week, Joe reflects on his unique path into cybersecurity and shares honest advice for breaking into the field. Plus, learn how cybercriminals are abusing AI to launch more sophisticated attacks and what you can do to stay protected. | Cyber blog | CISCO TALOS |
28.6.25 | ESET Threat Report H1 2025 | A view of the H1 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts | Cyber blog | Eset |
21.6.25 | NCSC Q1 2025 Report Reveals 14.7% Surge in Cybercrime Financial Losses in New Zealand | The NCSC’s Cyber Security Insights report for Q1 2025 shows a 14.7% rise in financial losses from cybercrime, with $7.8M lost mainly due to scams and fraud targeting NZ businesses. | Cyber blog | Cyble |
7.6.25 | The strange tale of ischhfd83: When cybercriminals eat their own | A simple customer query leads to a rabbit hole of backdoored malware and game cheats | Cyber blog | Sophos |
7.6.25 | Don’t let dormant accounts become a doorway for cybercriminals | Do you have online accounts you haven't used in years? If so, a bit of digital spring cleaning might be in order. | Cyber blog | Eset |
1.6.25 | Cybercriminals camouflaging threats as AI tool installers | Cisco Talos has uncovered new threats, including ransomware like CyberLock and Lucky_Gh0$t, and a destructive malware called Numero, all disguised as legitimate AI tool installers to target victims. | Cyber blog | CISCO TALOS |
1.6.25 | This month in security with Tony Anscombe – May 2025 edition | From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it's a wrap on another month filled with impactful cybersecurity news | Cyber blog | Eset |
1.6.25 | Word to the wise: Beware of fake Docusign emails | Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data | Cyber blog | Eset |
24.5.24 | Trend Micro Puts a Spotlight on AI at Pwn2Own Berlin | At Trend Micro, we believe we can make the digital world safer by proactively discovering threats and vulnerabilities that others haven’t yet seen. That’s why, every year, we invest millions of dollars in the Trend Zero Day Initiative™ (ZDI)—the world’s largest vendor-agnostic bug bounty program. | Cyber blog | Trend Micro |
24.5.24 | Scarcity signals: Are rare activities red flags? | Talos analyzed six months of PowerShell network telemetry and found that rare domains are over three times more likely to be malicious compared to frequently contacted ones. | Cyber blog | CISCO TALOS |
24.5.24 | Ghosted by a cybercriminal | Hazel observes that cybercriminals often fumble teamwork, with fragile alliances crumbling over missed messages. Plus, how UAT-6382 is exploiting Cityworks and what you can do to stay secure. | Cyber blog | CISCO TALOS |
17.5.24 | Redefining IABs: Impacts of compartmentalization on threat tracking and modeling | Threat actors are teaming up, splitting attacks into stages and making defense harder than ever. In Part 1, Cisco Talos examines their tactics and defines their motivations. | Cyber blog | CISCO TALOS |
17.5.24 | Understanding the challenges of securing an NGO | Joe talks about how helping the helpers can put a fire in you and the importance of keeping nonprofits cybersecure. | Cyber blog | CISCO TALOS |
17.5.24 | Operation RoundPress | Cyber blog | Eset | |
17.5.24 | How can we counter online disinformation? | Unlocked 403 cybersecurity podcast (S2E2) | Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation and how we can fight one of the most pressing challenges facing our digital world. | Cyber blog | Eset |
10.5.24 | How To Defend Against Threats With A Cyber Early Warning System | Security teams are constantly on the lookout for hidden threat infrastructure that isn’t already widely known, and doesn’t appear on anyone’s radar. This usually involves analyzing a significant amount of alert data and hunting for emerging domains and IPs that are in the process of being setup, across linked malicious hosting clusters. | Cyber blog | Silent Push |
10.5.24 | What Is the Goal of an Insider Threat Program? | Insider risk is one of the biggest cybersecurity threats that businesses face today. Insiders include employees, contractors or business partners with legitimate access to a company’s network, systems or data. Some misuse their access intentionally, while others make mistakes or fall victim to cybercriminals. | Cyber blog | PROOFPOINT |
10.5.24 | Email Attacks Drive Record Cybercrime Losses in 2024 | The FBI’s Internet Crime Complaint Center (IC3) has released its 2024 Internet Crime Report. And it has revealed a record-breaking surge in cybercrime losses across the United States. Last year, total losses reached $16.6 billion, which is a 33% increase from the previous year. | Cyber blog | PROOFPOINT |
10.5.24 | Proactive threat hunting with Talos IR | Learn more about the framework Talos IR uses to conduct proactive threat hunts, and how we can help you stay one step ahead of emerging threats. | Cyber blog | CISCO TALOS |
10.5.24 | The Bug Report - April 2025 Edition | Spring clean your security! Dive into April 2025’s top CVEs, live exploits, and patches. Stay ahead of attacks — read the full Bug Report now. | Cyber blog | Trelix |
10.5.24 | The Growing Threat of Vishing: How Cybercriminals Are Using Multimedia to Target You | New vishing attack technique we need to be aware of. How cybercriminals are using multimedia to target you. | Cyber blog | Trelix |
25.4.25 | Lessons from Ted Lasso for cybersecurity success | In this edition, Bill explores how intellectual curiosity drives success in cybersecurity, shares insights on the IAB ToyMaker’s tactics, and covers the top security headlines you need to know. | Cyber blog | CISCO TALOS |
25.4.25 | How fraudsters abuse Google Forms to spread scams | The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe. | Cyber blog | |
19.4.25 | Cyber Attack Surge: In Q1 2025, cyber attacks per organization increased by 47%, reaching an ... | Cyber blog | Checkpoint | |
19.4.25 | They’re coming for your data: What are infostealers and how do I stay safe? | Here's what to know about malware that raids email accounts, web browsers, crypto wallets, and more – all in a quest for your sensitive data | Cyber blog | |
19.4.25 | The Windows Registry Adventure #6: Kernel-mode objects | Welcome back to the Windows Registry Adventure! In the previous installment of the series, we took a deep look into the internals of the regf hive format. Understanding this foundational aspect of the registry is crucial, as it illuminates the design principles behind the mechanism, as well as its inherent strengths and weaknesses | Cyber blog | Project Zero |
19.4.25 | Closing the Security Gap From Threat Hunting to Detection Engineering | Learn how to use existing tooling to perform threat hunting and detection engineering to find hidden threats and strengthen your defenses. | Cyber blog | Trelix |
12.4.25 | CYFIRMA INDUSTRY REPORT : MATERIALS INDUSTRY | The CYFIRMA Industry Report delivers original cybersecurity insights and telemetry-driven statistics of global industries, covering one sector each week for a quarter. This report focuses on the materials industry, presenting key trends and statistics in an engaging infographic format. | Cyber blog | Cyfirma |
12.4.25 | CTEM + CREM: Aligning Your Cybersecurity Strategy | Organizations looking to implement CTEM don’t have to start from scratch. CREM can help you get there faster, with actionable insights, automated workflows, and continuous risk reduction. | Cyber blog | |
12.4.25 | Available now: 2024 Year in Review | Download Talos' 2024 Year in Review now, and access key insights on the top targeted vulnerabilities of the year, network-based attacks, email threats, adversary toolsets, identity attacks, multi-factor authentication (MFA) abuse, ransomware and AI-based attacks. | Cyber blog | Palo Alto |
12.4.25 | Threat actors thrive in chaos | Martin delves into how threat actors exploit chaos, offering insights from Talos' 2024 Year in Review on how to fortify defenses against evolving email lures and frequently targeted vulnerabilities, even amidst economic disruption. | Cyber blog | Palo Alto |
12.4.25 | Year in Review: Key vulnerabilities, tools, and shifts in attacker email tactics | From Talos' 2024 Year in Review, here are some findings from the top targeted network device vulnerabilities. We also explore how threat actors are moving away from time sensitive lures in their emails. And finally we reveal the tools that adversaries most heavily utilized last year. | Cyber blog | Palo Alto |
12.4.25 | Watch out for these traps lurking in search results | Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results | Cyber blog | Eset |
12.4.25 | So your friend has been hacked: Could you be next? | When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe. | Cyber blog | |
12.4.25 | 1 billion reasons to protect your identity online | Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t. | Cyber blog | |
5.4.25 | OH-MY-DC: OIDC Misconfigurations in CI/CD | In the course of investigating the use of OpenID Connect (OIDC) within continuous integration and continuous deployment (CI/CD) environments, Unit 42 researchers discovered problematic patterns and implementations that could be leveraged by threat actors to gain access to restricted resources. One instance of such an implementation was identified in CircleCI’s OIDC. | Cyber blog | Palo Alto |
5.4.25 | This month in security with Tony Anscombe – March 2025 edition | From an exploited vulnerability in a third-party ChatGPT tool to a bizarre twist on ransomware demands, it's a wrap on another month filled with impactful cybersecurity news | Cyber blog | |
5.4.25 | Resilience in the face of ransomware: A key to business survival | Your company’s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage | Cyber blog | |
29.3.25 |
Trend Cybertron: Full Platform or Open-Source? | Previously exclusive to Trend Vision One customers, select Trend Cybertron models, datasets and agents are now available via open-source. Build advanced security solutions and join us in developing the next generation of AI security technology. | Cyber blog | |
29.3.25 |
Money Laundering 101, and why Joe is worried | In this blog post, Joe covers the very basics of money laundering, how it facilitates ransomware cartels, and what the regulatory future holds for cybercrime. | Cyber blog | Cisco Blog |
29.3.25 |
Making it stick: How to get the most out of cybersecurity training | Security awareness training doesn’t have to be a snoozefest – games and stories can help instill ‘sticky’ habits that will kick in when a danger is near | Cyber blog | Eset |
22.3.25 |
Operation FishMedley | ESET researchers detail a global espionage operation by FishMonger, the APT group run by I‑SOON | Cyber blog | Eset |
22.3.25 |
MirrorFace updates toolset, expands targeting to Europe | The group's Operation AkaiRyū begins with targeted spearphishing emails that use the upcoming World Expo | Cyber blog | |
22.3.25 |
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor | ESET researchers uncovered MirrorFace activity that expanded beyond its usual focus on Japan and targeted a Central European diplomatic institute with the ANEL backdoor | Cyber blog | |
22.3.25 |
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor | ESET researchers uncovered MirrorFace activity that expanded beyond its usual focus on Japan and targeted a Central European diplomatic institute with the ANEL backdoor | Cyber blog | |
15.3.25 |
||||
15.3.25 |
||||
8.3.25 | Who is Responsible and Does it Matter? | Martin Lee dives into to the complexities of defending our customers from threat actors and covers the latest Talos research in this week's newsletter. | Cyber blog | |
8.3.25 | Kids behaving badly online? Here's what parents can do | By taking time to understand and communicate the impact of undesirable online behavior, you can teach your kids an invaluable set of life lessons for a new digital age | Cyber blog | Eset |
8.3.25 | Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani | Big shifts in the infostealer scene, novel attack vector against iOS and Android, and a massive surge in investment scams on social media | Cyber blog | |
1.3.25 | Laurie Anderson: Building an ARK | Starmus highlights | The pioneering multi-media artist reveals the creative process behind her stage show called ARK, which challenges audiences to reflect on some of the most pressing issues of our times | Cyber blog | |
22.2.25 | NIS2: Cybersecurity Becomes Law in Europe | NIS2 builds on the original directive to strengthen cybersecurity standards, ensuring greater protection for EU networks and increased accountability for organizations. | Cyber blog | |
22.2.25 |
Explore January 2025’s top CVEs, from RTF exploits to command injection chaos. Stay ahead with insights, PoCs, and patch recommendations. Protect your systems now! | |||
22.2.25 |
Cyber Threat Landscape Q&A with Trellix Head of Threat Intelligence John Fokker |
We sat down with Trellix Head of Threat Intelligence John Fokker to get his thoughts on the most pressing cyber threats of 2025 and biggest takeaways from 2024. | ||
22.2.25 |
Katharine Hayhoe: The most important climate equation | Starmus highlights |
|||
22.2.25 | ||||
22.2.25 |
What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10) |
|||
22.2.25 | ||||
22.2.25 |
Going (for) broke: 6 common online betting scams and how to avoid them |
|||
22.2.25 |
The evolving landscape of data privacy: Key trends to shape 2025 |
|||
22.2.25 |
Under lock and key: Protecting corporate data from cyberthreats in 2025 |
|||
22.2.25 |
Protecting children online: Where Florida’s new law falls short |
Some of the state’s new child safety law can be easily circumvented. Should it have gone further? |
||
22.2.25 |
Efficiency? Security? When the quest for one grants neither. |
William discusses what happens when security is an afterthought rather than baked into processes and highlights the latest of Talos' security research. |
||
22.2.25 |
Thorsten examines last year’s CVE list and compares it to recent Talos Incident Response trends. Plus, get all the details on the new vulnerabilities disclosed by Talos’ Vulnerability Research Team. |
|||
22.2.25 |
A technical overview of Cisco Talos' investigations into Google Cloud Platform Cloud Build, and the threat surface posed by the storage permission family. |
|||
18.1.25 | New Star Blizzard spear-phishing campaign targets WhatsApp accounts | In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending their typical targets spear-phishing messages, this time offering the supposed opportunity to join a WhatsApp group. This is the first time we have identified a shift in Star Blizzard’s longstanding tactics, techniques, and procedures (TTPs) to leverage a new access vector. | Cyber blog | Microsoft blog |
18.1.25 | One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph Neural Networks | When launching and persisting attacks at scale, threat actors can inadvertently leave behind traces of information. They often reuse, rotate and share portions of their infrastructure when automating their campaign’s setup before launching an attack. | Cyber blog | |
11.1.25 | Trend Micro Contributes and Maps Container Security to MITRE ATT&CK: A Game-Changer for Cyber Defense | Trend Micro leads the way by mapping its Container Security detection capabilities to the MITRE ATT&CK framework for Containers and contributing real-world attack data. | Cyber blog | |
11.1.25 | Blurring the Lines: How Nation-States and Organized Cybercriminals Are Becoming Alike | The distinction between nation-state actors and organized cybercriminals is becoming increasingly blurred in our rapidly evolving cyber landscape. Historically, these groups had distinct motivations: nation-states sought to achieve long-term geopolitical advantages through espionage and intelligence operations, while cybercriminals focused on financial gain, exploiting vulnerabilities for extortion, theft, and fraud. | Cyber blog | Trelix |
4.1.25 | Gary Marcus – Taming Silicon Valley | Starmus Highlights | The prominent AI researcher explores the societal impact of AI and calls for a reimagined approach to AI development that avoids the dangers of surveillance capitalism | Cyber blog | |
4.1.25 | This month in security with Tony Anscombe – December 2024 edition | Cyber blog | ||
4.1.25 | Chris Hadfield: The sky is falling – what to do about space junk? | Starmus Highlights | The first Canadian to walk in space dives deep into the origins of space debris, how it’s become a growing problem, and how we can clean up the orbital mess | Cyber blog | |
21.12.24 | Something to Read When You Are On Call and Everyone Else is at the Office Party | Its mid-December, if you’re on-call or working to defend networks, this newsletter is for you. Martin discusses the widening gap between threat and defences as well as the growing problem of home devices being recruited to act as proxy servers for criminals. | Cyber blog | |
21.12.24 | The adventures of an extroverted cyber nerd and the people Talos helps to fight the good fight | Ever wonder what an extroverted strategy security nerd does? Wonder no longer! This week, Joe pontificates on his journey at Talos, and then is inspired by the people he gets to meet and help. | Cyber blog | |
21.12.24 | ESET Research Podcast: Telekopye, again | Take a peek into the murky world of cybercrime where groups of scammers who go by the nickname of 'Neanderthals’ wield the Telekopye toolkit to ensnare unsuspecting victims they call 'Mammoths' | Cyber blog | |
21.12.24 | Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (ep. 9) | ESET's Jake Moore reveals why the holiday season is a prime time for scams, how fraudsters prey on victims, and how AI is supercharging online fraud | Cyber blog | |
21.12.24 | Cybersecurity is never out-of-office: Protecting your business anytime, anywhere | While you're enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your company's defenses are ready, no matter the time of year | Cyber blog | |
21.12.24 | ESET Threat Report H2 2024: Key findings | Cyber blog | ||
21.12.24 | ESET Threat Report H2 2024 | A view of the H2 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts | Cyber blog | |
21.12.24 | Black Hat Europe 2024: Hacking a car – or rather, its infotainment system | Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow | Cyber blog | |
21.12.24 | Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization | Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems | Cyber blog | |
21.12.24 | Black Hat Europe 2024: Can AI systems be socially engineered? | Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally? | Cyber blog | |
21.12.24 | How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8) | As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization's security strategy keep pace with today’s rapidly evolving threats? | Cyber blog | |
21.12.24 | Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks | Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost | Cyber blog | |
21.12.24 | How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8) | As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization's security strategy keep pace with today’s rapidly evolving threats? | Cyber blog | |
21.12.24 | Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks | Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost | Cyber blog | |
21.12.24 | Achieving cybersecurity compliance in 5 steps | Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements | Cyber blog | |
2.11.24 | Talos IR trends Q3 2024: Identity-based operations loom large | Credential theft was the main goal in 25% of incidents last quarter, and new ransomware variants made their appearance - read more about the top trends, TTPs, and security weaknesses that facilitated adversary actions. | Cyber blog | Cisco Blog |
2.11.24 | Writing a BugSleep C2 server and detecting its traffic with Snort | This blog will demonstrate the practice and methodology of reversing BugSleep’s protocol, writing a functional C2 server, and detecting this traffic with Snort. | Cyber blog | Cisco Blog |
2.11.24 | Highlighting TA866/Asylum Ambuscade Activity Since 2021 | TA866 (also known as Asylum Ambuscade) is a threat actor that has been conducting intrusion operations since at least 2020. | Cyber blog | Cisco Blog |
2.11.24 | Month in security with Tony Anscombe – October 2024 edition | Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories | Cyber blog | |
2.11.24 | How to remove your personal information from Google Search results | Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results. | Cyber blog | |
2.11.24 | Don't become a statistic: Tips to help keep your personal data off the dark web | You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take steps to protect yourself from criminals looking to exploit it | Cyber blog | |
2.11.24 |
ESET Research Podcast: CosmicBeetle | Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world | Cyber blog | |
2.11.24 | Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7) | “Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online – and even be the start of a predatory relationship | Cyber blog | |
2.11.24 | Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships | The world needs more cybersecurity professionals – here are three great ways to give you an ‘in’ to the ever-growing and rewarding security industry | Cyber blog | |
2.11.24 | Cyber insurance, human risk, and the potential for cyber-ratings | Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility? | Cyber blog | |
2.11.24 | The complexities of attack attribution – Week in security with Tony Anscombe | Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week | Cyber blog | |
2.11.24 | Cybersecurity Awareness Month needs a radical overhaul – it needs legislation | Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices | Cyber blog | |
2.11.24 | Gamaredon's operations under the microscope – Week in security with Tony Anscombe | ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years | Cyber blog | |
28.9.24 | Cybersecurity Compass: Bridging the Communication Gap | Discover how to use the Cybersecurity Compass to foster effective conversations about cybersecurity strategy between non-technical and technical audiences, focusing on the phases of before, during, and after a breach. | Cyber blog | |
21.9.24 | Understanding cyber-incident disclosure | Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help | Cyber blog | |
7.9.24 | The key considerations for cyber insurance: A pragmatic approach | Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance options | Cyber blog | |
31.8.24 | August 2024 Bug Report: Explore seven critical vulnerabilities—Ivanti vTM, Windows CLFS, Apache OFBiz, and more. Stay ahead of the threats, patch now! | |||
31.8.24 | As we head into the final third of 2024, we caught up with Talos' Nick Biasini to ask him about the biggest shifts and trends in the threat landscape so far. Turns out, he has two major areas of concern. | |||
10.8.24 | No symbols? No problem! | This blog will share a tried and tested method for dealing with thousands of unknown functions in a given file to significantly decrease the time spent on analysis while improving accuracy. Once all theory is covered, an instance of the Golang based qBit stealer is analyzed with the demonstrated techniques to show what happens when the theory is put into practice. | Cyber blog | Trelix |
10.8.24 | Resilient Security Requires Mature Cyber Threat Intelligence Capabilities | We recently had the opportunity to support an important industry effort to advance threat intelligence, led by our partners at Intel 471. Trellix, along with 25+ cyber leaders, launched a new maturity model for cyber threat intelligence (CTI). | Cyber blog | Trelix |
10.8.24 | Black Hat USA 2024 recap – Week in security with Tony Anscombe | Unsurprisingly, many discussions focused on the implications of the recent CrowdStrike outage, including the lessons it may have offered for bad actors | Cyber blog | |
10.8.24 | Black Hat USA 2024: All eyes on election security | In this high-stakes year for democracy, the importance of robust election safeguards and national cybersecurity strategies cannot be understated | Cyber blog | |
10.8.24 | Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies | Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards | Cyber blog | |
10.8.24 | Why tech-savvy leadership is key to cyber insurance readiness | Having knowledgeable leaders at the helm is crucial for protecting the organization and securing the best possible cyber insurance coverage | Cyber blog | |
3.8.24 | Where to find Talos at BlackHat 2024 | This year marks the 10th anniversary of Cisco Talos, as the Talos brand was officially launched in August 2014 at Black Hat. | Cyber blog | Cisco Blog |
3.8.24 | The cyberthreat that drives businesses towards cyber risk insurance | Many smaller organizations are turning to cyber risk insurance, both to protect against the cost of a cyber incident and to use the extensive post-incident services that insurers provide | Cyber blog | |
27.7.24 | Trend Experts Weigh in on Global IT Outage Caused by CrowdStrike | On July 19, 2024, a large-scale outage emerged affecting Windows computers for many industries across the globe from financial institutions to hospitals to airlines. The source of this outage came from a single content update from CrowdStrike. | ||
27.7.24 | When tackling a new vulnerability research target, especially a closed-source one, I prioritize gathering as much information about it as possible. This gets especially interesting when it's a subsystem as old and fundamental as the Windows registry. | |||
27.7.24 | Seeing a “blue screen of death,” often with code that looks indecipherable, has been ingrained into our heads that it’s a “hack." | |||
27.7.24 | Building cyber-resilience: Lessons learned from the CrowdStrike incident | |||
20.7.24 | Trend Experts Weigh in on Global IT Outage Caused by CrowdStrike | On July 19, 2024, a large-scale outage emerged affecting Windows computers for many industries across the globe from financial institutions to hospitals to airlines. The source of this outage came from a single content update from CrowdStrike. | Cyber blog | Trend Micro |
20.7.24 | Teaming up with IBM to secure critical SAP workloads | Trend Micro partners with IBM to offer advanced threat detection and response for protecting critical infrastructures running on IBM Power servers | Cyber blog | Trend Micro |
20.7.24 | Small but mighty: Top 5 pocket-sized gadgets to boost your ethical hacking skills | These five formidable bits of kit that can assist cyber-defenders in spotting chinks in corporate armors and help hobbyist hackers deepen their understanding of cybersecurity | Cyber blog | Eset |
13.7.24 | Application Security report: 2024 update | Cloudflare’s updated 2024 view on Internet cyber security trends spanning global traffic insights, bot traffic insights, API traffic insights, and client-side risks... | Cyber blog | Cloudflare |
13.7.24 | Network detection & response: the SOC stress reliever | Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important. | Cyber blog | Trend Micro |
13.7.24 | Checking in on the state of cybersecurity and the Olympics | Even if a threat actor isn’t successful in some widespread breach that makes international headlines, even smaller-scale threats and actors are just hoping to cause chaos. | Cyber blog | Cisco Blog |
29.6.24 | Omdia Report: Trend Disclosed 60% of Vulnerabilities | The latest Omdia Vulnerability Report shows Trend Micro™ Zero Day Initiative™ (ZDI) spearheaded 60% of 2023 disclosures, underscoring its role in cybersecurity threat prevention. | Cyber blog | Trend Micro |
29.6.24 | Not Just Another 100% Score: MITRE ENGENUITY ATT&CK | The latest MITRE Engenuity ATT&CK Evaluations pitted leading managed detection and response (MDR) services against threats modeled on the menuPass and BlackCat/AlphV adversary groups. | Cyber blog | Trend Micro |
29.6.24 | Tabletop exercises are headed to the next frontier: Space | More on the recent Snowflake breach, MFA bypass techniques and more. | Cyber blog | Cisco Blog |
29.6.24 | Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models | At Project Zero, we constantly seek to expand the scope and effectiveness of our vulnerability research. Though much of our work still relies on traditional methods like manual source code audits and reverse engineering, we're always looking for new approaches. | Cyber blog | Project Zero |
29.6.24 | The Windows Registry Adventure #3: Learning resources | When tackling a new vulnerability research target, especially a closed-source one, I prioritize gathering as much information about it as possible. This gets especially interesting when it's a subsystem as old and fundamental as the Windows registry. | Cyber blog | Project Zero |
29.6.24 | ESET Threat Report H1 2024 | A view of the H1 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts | Cyber blog | Eset |
29.6.24 | Cyber insurance as part of the cyber threat mitigation strategy | Why organizations of every size and industry should explore their cyber insurance options as a crucial component of their risk mitigation strategies | Cyber blog | Eset |
29.6.24 | Buying a VPN? Here’s what to know and look for | VPNs are not all created equal – make sure to choose the right provider that will help keep your data safe from prying eyes | Cyber blog | Eset |
29.6.24 | The long-tail costs of a data breach – Week in security with Tony Anscombe | Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents | Cyber blog | Eset |
29.6.24 | My health information has been stolen. Now what? | As health data continues to be a prized target for hackers, here's how to minimize the fallout from a breach impacting your own health records | Cyber blog | Eset |
29.6.24 | Hacktivism is evolving – and that could be bad news for organizations everywhere | Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat | Cyber blog | Eset |
29.6.24 | Preventative defense tactics in the real world | Cyber blog | Eset | |
1.6.24 | Beyond the buzz: Understanding AI and its role in cybersecurity | A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders | Cyber blog | Eset |
18.5.24 | Rounding up some of the major headlines from RSA | Here’s a rundown of some things you may have missed if you weren’t able to stay on top of the things coming out of the conference. | Cyber blog | Cisco Blog |
11.5.24 | It's a wrap! RSA Conference 2024 highlights – Week in security with Tony Anscombe | More than 40,000 security experts descended on San Francisco this week. Let's now look back on some of the event's highlights – including the CISA-led 'Secure by Design' pledge also signed by ESET | Cyber blog | Eset |
28.4.24 | Talos IR trends: BEC attacks surge, while weaknesses in MFA persist | Within BEC attacks, adversaries will send phishing emails appearing to be from a known or reputable source making a valid request, such as updating payroll direct deposit information. | Cyber blog | Cisco Blog |
28.4.24 | Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals | Python’s versatility and short learning curve are just two factors that explain the language’s 'grip' on cybersecurity | Cyber blog | Eset |
13.4.24 | eXotic Visit campaign: Tracing the footprints of Virtual Invaders | ESET researchers uncovered the eXotic Visit espionage campaign that targets users mainly in India and Pakistan with seemingly innocuous apps | Cyber blog | Eset |
13.4.24 | 7 reasons why cybercriminals want your personal data | Here's what drives cybercriminals to relentlessly target the personal information of other people – and why you need to guard your data like your life depends on it | Cyber blog | Eset |
31.3.24 | Cybercriminals play dirty: A look back at 10 cyber hits on the sporting world | This rundown of 10 cyberattacks against the sports industry shows why every team needs to keep its eyes on the ball when it comes to cybersecurity | Cyber blog | Eset |
31.3.24 | Cybersecurity starts at home: Help your children stay safe online with open conversations | Struggle to know how to help children and teens stay safe in cyberspace? A good ol’ fashioned chat is enough to put them on the right track. | Cyber blog | Eset |
23.3.24 | “Pig butchering” is an evolution of a social engineering tactic we’ve seen for years | In the case of pig butchering scams, it’s not really anything that can be solved by a cybersecurity solution or sold in a package. | Cyber blog | Cisco Blog |
17.3.24 | Threat intelligence explained | Unlocked 403: A cybersecurity podcast | We break down the fundamentals of threat intelligence and its role in anticipating and countering emerging threats | Cyber blog | Eset |
17.3.24 | Election cybersecurity: Protecting the ballot box and building trust in election integrity | What cyberthreats could wreak havoc on elections this year and how worried should we as voters be about the integrity of our voting systems? | Cyber blog | Eset |
9.3.24 | The 3 most common post-compromise tactics on network infrastructure | We discuss three of the most common post-compromise tactics that Talos has observed in our threat telemetry and Cisco Talos Incident Response (Talos IR) engagements. These include modifying the device’s firmware, uploading customized/weaponized firmware, and bypassing security measures. | Cyber blog | Cisco Blog |
9.3.24 | Heather Couk is here to keep your spirits up during a cyber emergency, even if it takes the “Rocky” music | The bulk of her career was with a manufacturing company working as a security and email administrator, but she uses her criminal justice degree daily now with Talos IR helping to track down bad actors or helping customers understand adversaries’ motivation and tactics. | Cyber blog | Cisco Blog |
25.2.24 | 2024’S CYBER BATTLEGROUND UNVEILED: ESCALATING RANSOMWARE EPIDEMIC, THE EVOLUTION OF CYBER WARFARE TACTICS AND STRATEGIC USE OF AI IN DEFENSE – INSIGHTS FROM CHECK POINT’S LATEST SECURITY REPORT | Rising Threats: Cybersecurity landscape faces an unprecedented surge in ransomware attacks, with 1 in every 10 organizations globally being targeted in 2023. | Cyber blog | Checkpoint |
25.2.24 | Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war | A mix of PSYOPs, espionage and … fake Canadian pharmacies! | Cyber blog | Eset |
10.2.24 | How are user credentials stolen and used by threat actors? | You’ve probably heard the phrase, “Attackers don’t hack anyone these days. They log on.” In this blog, we describe the various tools and techniques bad actors are using to steal credentials so they can 'log on' with valid account details, and outline our recommendations for defense. | Cyber blog | Cisco Blog |
4.2.24 | ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora | An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes | Cyber blog | Eset |
4.2.24 | Cyber: The Swiss army knife of tradecraft | In today’s digitally interconnected world, advanced cyber capabilities have become an exceptionally potent and versatile tool of tradecraft for nation-states and criminals alike | Cyber blog | Eset |
4.2.24 | Assessing and mitigating supply chain cybersecurity risks | Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management | Cyber blog | Eset |