Nozomi Networks notched a $100 million funding round led by Schneider Electric and Mitsubishi, spotlighting the urgent need for advanced cybersecurity measures to protect critical infrastructure, industrial control systems and IoT networks in light of the increased destructiveness of attacks.
Threat actors are using image files or Scalable Vector Graphics files to deliver ransomware, download banking Trojans or distribute malware. The campaign uses an open-source tool, AutoSmuggle, to facilitate the delivery of malicious files through SVG or HTML files.
The European Parliament on Wednesday approved the Artificial Intelligence Act, completing a penultimate step to enacting the world's first comprehensive AI regulation. The act needs final signoff from the European Council, which is expected by May.
Agility, scale and consumption - these are three business benefits Palo Alto Networks Software Firewalls bring to cloud network security. Tiffany Henry and Katherine Rigdon of Palo Alto Networks showcase these features and the value of finding them all on a single platform.
Criminals in China increasingly keep a low profile on public-facing forums and rely on Telegram and other encrypted foreign messaging apps to discreetly coordinate their activities or sell wares, according to a new report charting how the Chinese cybercrime ecosystem continues to evolve.
LockBit ransomware affiliate Mikhail Vasiliev on Tuesday received a nearly four-year prison sentence in Canada and consented to extradition to the United States, where he faces charges of conspiracy to commit computer intrusion. He must also pay CA$860,000 in restitution to his Canadian victims.
The Spanish High Court on Monday sided with the country's data regulator, the Spanish Data Protection Agency, to uphold a three-month ban on OpenAI founder Sam Altman's controversial digital identity and cryptocurrency platform Worldcoin due to privacy concerns.
DARPA said it wants to "redefine" AI security, so it is offering support to seven small businesses to automatically find and fix software vulnerabilities at scale. As part of its AI Cyber Challenge, DARPA awarded the companies $1 million each to develop a "cyber reasoning system" using AI.
Ransomware groups may come and go, but often it's only in name, as the individuals involved will move on to power whatever group remains a going concern. Cue a reported flow of top talent from LockBit, which was recently disrupted by law enforcement, to Akira, which is apparently alive and well.
Authoritarian countries are seizing on technological advances to sway the global balance during a time of increased geopolitical fragility, U.S. intelligence agencies warned in an annual threat assessment. Generative artificial intelligence and biotechnology have high potential for shifting power.
First-party fraud hits banks from many different places - credit card fraud claims, bust-out schemes, lending fraud and synthetic identity fraud. The diversity of scams poses major challenges in spotting fraudulent activity, said Frank McKenna, chief strategist and co-founder of Point Predictive.
The U.S. Government Accountability Office found that CISA lacks the skilled staff to effectively share information with critical infrastructure operators about threats. Also, the GAO found that the Pipeline and Hazardous Materials Safety Administration lacked an information-sharing process.
What did Microsoft mean when it said that nation-state hackers are "attempting to use secrets of different types" they found in its emails with customers, what's the risk posed by those attackers also accessing Microsoft's source code and what can - and should - customers do about it all?
Phishing attacks continue to adapt to exploit popular apps. While many phishing campaigns have focused on mobile banking and payment sites, attackers are also targeting widely used but lower-profile, cloud-based utilities such as the ubiquitous Dropbox storage platform.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.