Why Use Strong Passwords? Everyone Knows This, But Too Few People Actually Follow It

Password security is a major concern for companies, and one of the biggest challenges is getting employees to use better password hygiene. To shore up security, you need to find practices that your employees will actually use. To make it easier, consider sharing these five recommendations to help them find

Read More

Cybercriminals Have Started Using OpenAI’s ChatGPT To Spread Malware, And Dating Fraudsters Want To Use It To Make Realistic Fake Girls

Cybercriminals have started using OpenAI’s artificially intelligent chatbot ChatGPT to quickly build hacking tools, cybersecurity researchers warned on Friday. Scammers are also testing ChatGPT’s ability to build other chatbots designed to impersonate young females to ensnare targets, one expert monitoring criminal forums told Forbes. Many early ChatGPT users had raised

Read More

Cybersecurity Trends, Signals, And Experience: Key Cybersecurity Predictions For 2023

Society has been predicting the technology of the future since Jules Verne. Remember the Jetsons? Based on the predictions in that show, we should be flying cars to work and enjoying fully automated robot maid service. But for cybersecurity, predicting the future is grounded in realities that are already here.

Read More

Cookie Theft: Attackers May Defeat Multi-Factor Authentication Through Cookie Theft

Multi-factor authentication (MFA) is a good security measure, most of the time. It enables a company to add a layer of security to its corporate VPN, for example. The user, in addition to a (hopefully) strong password, needs to enter another code, which can be accessed from another device. It

Read More

The Top Ten Cybersecurity Risks That Are Expected To Impact IT Industries In The Year 2023

Going into 2023, cybersecurity is still topping the list of CIO concerns. This comes as no surprise. In the first half of 2022, there were 2.8 billion worldwide malware attacks and 236.1 million ransomware attacks. By year end 2022, it is expected that six billion phishing attacks will have been

Read More

Find Out What The Top 6 Security Threats Are To Industrial IoT And How You Can Prevent Them

In the last decade, the world has witnessed the rapid evolution of the Internet of Things. While this technology has become pronounced in powering smart homes, outdoor surveillance and smart lighting, it is becoming increasingly pervasive in industrial spaces. Although there are plenty of use cases for industrial IoT solutions,

Read More

Cyberattacks On Airport Websites In The United States Indicate A Growing Threat To Critical Infrastructure

The transportation industry appears to be waking up to a renewed specter of threats following a series of distributed denial-of-service (DDoS) attacks that temporarily took down several U.S. airport websites. These sorts of targeted hacks on critical infrastructure often precede necessary and crucial advancements in the application of cybersecurity best

Read More

Attack Against Windows, Linux, And Mac Using A Command And Control (C2) Framework That May Have A Chinese Origin

A standalone Command and Control (C2) server called “Alchimist” was recently discovered by Cisco Talos. The framework has been designed to run attacks via standalone GoLang-based executables that can be distributed easily. The framework found by Talos contains both the whole web user interface and the payloads. GoLang Written Framework

Read More

Source Code Repository SourceHut Is Discontinuing Cryptocurrencies And Blockchain-Related Software Initiatives

Open-source repository SourceHut is pulling the plug on software projects that tap into cryptocurrency and blockchain. In a post published on Monday, Oct. 31, SourceHut founder and creator Drew DeVault said he would ban projects associated with these technologies, citing their use in “get-rich-quick” schemes and other types of scams.

Read More

2022: Four Ransomware Groups Who Create Chaos And Cyberthreats In Cyberspace

2022 marked another year in which ransomware proved to be one of the most pernicious cyberthreats around the world. Targeting victims both large and small, ransomware gangs showed that they could still wreak havoc despite efforts by law enforcement and governments to crack down on them. Though a variety of

Read More

Cloud Security: User Must Understand The Risks Involved And Implement Adequate Security Controls

Protecting data and applications in the cloud involves managing people, processes and technology with stringent policies. There has been a tremendous increase in the number of organizations migrating to the cloud due to its excellent reliability, scalability and reduced costs. Cloud security plays a key role in this transition and

Read More

In Order To Spread Malware, Cyber Criminal Might Use Software Repositories Or Download Locations

As recently exposed by Cisco Talos, software supply chain attacks have gained popularity amongst all kinds of cyber criminals. Once exclusively used by cyberespionage threat actors, these attacks have now also become attractive for any kind of cybercriminal, who sees in this threat a way to compromise hundreds or thousands

Read More