Turla, a hacking group based in Russia, is deploying a revamped set of customized tools to target potential victims, including a European government agency, for its espionage campaigns, according to Accenture.
The operators behind the Ryuk strain of malware are increasingly relying on a malware-as-a-service tool - the Buer loader - to deliver the malware, rather than botnets such as Trickbot and Emotet, the security firm Sophos reports.
The U.S. Cybersecurity and Infrastructure Security Agency and the FBI have issued an alert providing details on the activities of a North Korean hacking group dubbed Kimsuky. The group, which has primarily focused on South Korean targets, has also conducted espionage campaigns in the U.S. and Japan.
As our workforce becomes increasingly disparate and fluid, privileged access is emerging as a key cyber security concern for many organisations.
Gartner cited privileged access management as the number one project for CISOs for the past two years. But, according to Thycotic research, 66% of CISOs struggle to get...
Online disinformation campaigns by nation-state actors are the biggest cyberthreat to the U.S. election as hackers attempt to influence final vote tallies as a way to undermine confidence, according to a Digital Shadows report. Russian hackers are most active, followed by Iran and China.
How fast is your IT? You need speed and adaptability to adjust as big changes in the global economy and our daily lives keep coming. Are you prepared for what's next? What are IT organizations saying about it all?
This spring, 2,200 IT professionals and senior IT leaders participated in a survey and shared:
Many organizations are now realizing the business value of low-code application platforms, including how they solve common development problems like technical debt and process inefficiencies.
The 6 key ways developers are benefiting by low-code are outlined, plus you'll discover how a low-code...
90 percent of organizations have aging legacy systems and applications that are hampering their ability to deliver innovative products and services. The solutions for addressing "legacy gridlock" are many and varied, leaving organizations with more questions than answers:
Do I replace or refactor?
Do I rebuild...
Security researchers at Imperva have uncovered a botnet that attacks vulnerabilities in websites' underlying content management systems and then uses these compromised servers to mine for cryptocurrency or send spam to more victims.
"Cybercrime is an evolution, not a revolution," says Europol's Philipp Amann, who oversees the EU law enforcement intelligence agency's annual study of the latest cyber-enabled crime trends. Ransomware, social engineering and the criminal abuse of cryptocurrency and encryption are some of the top threats.
Ignite '20, the annual cybersecurity conference sponsored by Palo Alto Networks, will be held in mid-November, Ryan Olson and Bret Padres preview the event by discussing the shifting cybersecurity landscape and what to expect to see at Ignite '20.
At a time of disruption and uncertainty, with more disruption and uncertainty to come, businesses must move rapidly towards digital transformation, take more risks, and adjust to new customer behaviors and preferences. Building applications and updating legacy systems must happen faster, which means hand-coding is not...
Heading into 2021, enterprises have more endpoints to secure than ever. And fortified by its acquisition of Panda Security, WatchGuard Technologies now has a stronger endpoint security strategy. Corey Nachreiner and Marc Laliberte discuss the dual evolution of targeted attacks and endpoint security solutions.