Aug 03, 2023THNCyber Threat / Network Security Microsoft is warning of the threat malicious cyber actors pose to stadium operations, warning that the cyber risk surface of live sporting events is "rapidly expanding." "Information on athletic performance, competitive advantage, and personal information is a lucrative target," the company said in a Cyber Signals report shared … [Read more...] about Microsoft Flags Growing Cybersecurity Concerns for Major Sporting Events
cybersecurity
Consolidating Cybersecurity with CrowdStrike | CrowdStrike
As adversaries continue to evolve their tactics and techniques, organizations are scrambling to shore up their security posture. Security teams have historically turned to point products to fill gaps in their defenses, driving the issue of tool sprawl: The average enterprise deploys 45 cybersecurity-related tools, according to the Ponemon Institute. When it comes to security, … [Read more...] about Consolidating Cybersecurity with CrowdStrike | CrowdStrike
U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog
Jun 24, 2023Ravie LakshmananThreat Intel / Zero Day The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of six flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. This comprises three vulnerabilities that Apple patched this week (CVE-2023-32434, CVE-2023-32435, and CVE-2023-32439), two flaws in VMware … [Read more...] about U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog
Activities in the Cybercrime Underground Require a New Approach to Cybersecurity
As Threat Actors Continuously Adapt their TTPs in Today's Threat Landscape, So Must You Earlier this year, threat researchers at Cybersixgill released the annual report, The State of the Cybercrime Underground. The research stems from an analysis of Cybersixgill's collected intelligence items throughout 2022, gathered from the deep, dark and clear web. The report examines the … [Read more...] about Activities in the Cybercrime Underground Require a New Approach to Cybersecurity
High risk but low funding: How UK universities can do cybersecurity on a budget
According to recent research from the Department of Science, Innovation and Technology, over the past year, 85% of UK higher education institutions reported finding a cyber breach. This number is significantly higher compared to UK businesses — of which only 32% reported breaches. Perhaps what’s even more worrying is the frequency of higher ed breaches: half of higher ed … [Read more...] about High risk but low funding: How UK universities can do cybersecurity on a budget
China Bans U.S. Chip Giant Micron, Citing “Serious Cybersecurity Problems”
May 23, 2023Ravie LakshmananNational Security / Hardware China has banned U.S. chip maker Micron from selling its products to Chinese companies working on key infrastructure projects, citing national security risks. The development comes nearly two months after the country's cybersecurity authority initiated a probe in late March 2023 to assess potential network security … [Read more...] about China Bans U.S. Chip Giant Micron, Citing “Serious Cybersecurity Problems”
U.S. Cybersecurity Agency Raises Alarm Over Royal Ransomware’s Deadly Capabilities
Mar 03, 2023Ravie LakshmananEndpoint Security / Ransomware The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory about Royal ransomware, which emerged in the threat landscape last year. "After gaining access to victims' networks, Royal actors disable antivirus software and exfiltrate large amounts of data before ultimately deploying the … [Read more...] about U.S. Cybersecurity Agency Raises Alarm Over Royal Ransomware’s Deadly Capabilities
Using Artificial Intelligence and Machine Learning to Combat Hands-on-Keyboard Cybersecurity Attacks
Malware gets the headlines, but the bigger threat is hands-on-keyboard adversary activity which can evade traditional security solutions and present detection challenges Machine learning (ML) can predict and proactively protect against emerging threats by using behavioral event data. CrowdStrike’s artificial intelligence (AI)-powered indicators of attack (IOAs) use ML to detect … [Read more...] about Using Artificial Intelligence and Machine Learning to Combat Hands-on-Keyboard Cybersecurity Attacks
Chinese Tonto Team Hackers’ Second Attempt to Target Cybersecurity Firm Group-IB Fails
Feb 13, 2023Ravie LakshmananCyber Threat Intelligence The advanced persistent threat (APT) actor known as Tonto Team carried out an unsuccessful attack on cybersecurity company Group-IB in June 2022. The Singapore-headquartered firm said that it detected and blocked malicious phishing emails originating from the group targeting its employees. It's also the second attack aimed … [Read more...] about Chinese Tonto Team Hackers’ Second Attempt to Target Cybersecurity Firm Group-IB Fails
36% of CISOs see the shortage of skilled workers as their key cybersecurity challenge
Step 1: Linux FundamentalsLearn basic operational skills for the Linux command line.Step 2: Network Protocol AnalysisExplore network protocols to include DHCP, ARP, ICMP, LDAP, Kerberos, SMTP, and SSH.Step 3: Packet AnalysisExplore networking concepts and packet analysis tools including Wireshark, Stenographer, and Docket.Step 4: Intrusion Detection System (IDS) Log Analysis … [Read more...] about 36% of CISOs see the shortage of skilled workers as their key cybersecurity challenge