Nation-state attackers pose a growing cybersecurity threat driven by specific geopolitical or economic objectives. These actors often target organizations with valuable data, using advanced techniques such as reconnaissance, said Ryan Roobian, global solutions architect, Google Cloud.
If 2024 was the year in which cybercriminals experimented more with AI/ML in the refinement and scale of their attacks, then 2025 must be the year when cyber defenders evolve to better embrace AI in their defenses. These are among the 2025 threat predictions by Fortinet's Derek Manky.
In an era where cybersecurity is more critical than ever, the collaboration between Darktrace and Microsoft stands out as a beacon of innovation. Join Francesca Bowen, Global Vice President of Cloud Alliances at Darktrace and Jeff Chin, Microsoft Global Blackbelt for an engaging fireside chat where we’ll explore how...
A threat actor with suspected ties to Russian nation-state hackers has listed thousands of IoT devices as proxy networks within minutes of their initial compromise. A campaign that began in 2020 has so far infected 20,000 IoT devices, according to a new report by Trend Micro.
Bitsight's $115 million acquisition of Cybersixgill will merge automated threat intelligence with risk exposure tools. This strategic move reflects the growing demand for streamlined cybersecurity solutions and aligns with Bitsight's mission to enhance cyber-risk management.
In the latest weekly update, ISMG editors explored the growing threat of disrupted ransomware attacks as a public health crisis, the potential global impact of a Donald Trump's second presidential term, and implications of the latest big merger in the cybersecurity market.
Defence-oriented cybersecurity strategies have historically been favoured to protect organisations’ digital assets. This approach has its roots in the castle-and-moat strategy, which was utilised in the 1990s and early 2000s to protect a small number of known assets.
However, defensive strategies are inherently...
Godzilla webshell, a Chinese-language backdoor known for its stealth and ability to execute commands and manipulate files, is publicly available on GitHub, and federal authorities have issued a stern warning to the healthcare sector to prepare for this threat and inevitable cyberattacks.
SoftBank-backed merger between Trustwave and Cybereason brings together leading MDR, EDR, DFIR and threat intelligence capabilities. The combined organization aims to improve AI-driven detection and enhance Microsoft E5 support, targeting enterprise, mid-market, and public sector clients worldwide.
Federal authorities are warning the healthcare sector of an array of cyberthreats - including Scattered Spider hacks, living-off-the-land attacks, and bad actors looking to exploit weaknesses such as F5 misconfigurations and also so-called "Miracle Exploit" flaws in some Oracle software.
Industrial control systems (ICS) play a vital role in critical infrastructure, yet new research from Bitsight's TRACE team has exposed multiple critical vulnerabilities in Automated Tank Gauge (ATG) systems. Join experts Jake Olcott, VP of Government Affairs, and Pedro Umbelino, Principal Research Scientist, as they...
Cyberattacks are evolving at unprecedented speed, scale and sophistication. When every second counts, you need an experienced cybersecurity partner that can help you mitigate and recover from an attack quickly and effectively.
Unit 42® is proud to be recognized as a Leader in The Forrester Wave™: Cybersecurity...
Join our upcoming webinar where we will delve into critical challenges like managing data overload, ensuring contextual relevance, achieving real-time visibility, and fostering secure collaboration. We’ll explore innovative approaches, including the integration of advanced threat intelligence frameworks, methods for...
The ever-expanding threat landscape keeps evolving, and it is easy to overlook key areas that could expose your organization. However, you can stay ahead of constantly evolving threats and gain peace of mind with this comprehensive checklist.
These recommendations, abstracted from the latest 2022 Unit 42 Incident...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.