Skip to content
Home
About us
Advisory Council
Latam Ciso
Insights
Events
Reports
Contact
Menu
Home
About us
Advisory Council
Latam Ciso
Insights
Events
Reports
Contact
Articles & blog
Fake Pegasus spyware source code floods dark web
Cybercriminals are exploiting the notoriety of NSO Group’s Pegasus spyware to dupe victims on the dark web, according to cybersecurity firm CloudSEK. This revelation comes just weeks after Apple warned...
LockBit no longer world’s No. 1 ransomware gang
Well-known ransomware gang LockBit has been usurped as the world’s top ransomware gang, according to a recent report from NCC Group. For the past eight months, LockBit has led the...
Tracking manual attacks may deliver zero-day previews
Differentiating between manual and bot attacks, and homing in on human ones in particular, can give security professionals a leg up on combatting fraud attempts versus corporate systems. According to...
Building an AI strategy for the modern SOC
Artificial intelligence (AI) holds significant promise to increase productivity across business functions, and cybersecurity is no exception. Arguably no area of the security operation is more poised to benefit from...
Top cybersecurity M&A deals for 2024
Cybersecurity continues to remain one of the biggest concerns in global information technology in 2024 following a year that saw security incidents continue to grow at an alarming rate. After...
Emerging ransomware groups on the rise: Who they are, how they operate
The shutdown of BlackCat (ALPHV) in March and the law enforcement disruption of LockBit infrastructure in February have created a void in the ransomware ecosystem that’s quickly being filled by...
What is spear phishing? Examples, tactics, and techniques
Spear phishing definition Spear phishing is a direct, targeted email attack aimed at specific individuals that appears to come from a trusted sender. In spear phishing, attackers often use information...
Windows Recall — a ‘privacy nightmare’?
Windows Recall, the new feature that records a user’s screen at regular intervals, has been labelled a “privacy nightmare” due to potential data privacy and security risks. Microsoft announced the generative...
Kroll cyber threat landscape report: AI assists attackers
In its frontline threat intelligence report for the first quarter of 2024, risk and financial advisory firm Kroll revealed that, as in virtually every other industry, cyber criminals are using...
How quantum-safe cryptography will ensure a secure computing future
The National Institute of Standards and Technology (NIST), a US government lab that publishes standards for government agencies to safely use cryptography, has just announced the winners of a six-year-long...
Page
1
Page
2