Recent Security News

  • How Data Changes the Cyber-Insurance Market Outlook

    October 16, 2023 at 10:08AM The global cyber insurance market is growing rapidly, expected to reach $84.62 billion by 2030. However, many companies are uncertain about how much coverage they need, and insurers struggle to assess individual risk. This has led to significant losses in the cyber insurance market. Rates have spiked due to increased…

    Read More

  • Pro-Russian Hackers Exploiting Recent WinRAR Vulnerability in New Campaign

    October 16, 2023 at 10:03AM Russian hacking groups have been exploiting a security vulnerability in the WinRAR archiving utility to launch a phishing campaign. The attack involves malicious archive files that exploit the vulnerability, allowing the attacker to gain remote access to compromised systems. The campaign also steals data from Google Chrome and Microsoft Edge…

    Read More

  • SpyNote: Beware of This Android Trojan that Records Audio and Phone Calls

    October 16, 2023 at 09:15AM The Android banking trojan, SpyNote, has been analyzed, revealing its various information-gathering capabilities. Spread through SMS phishing campaigns, the malware tricks victims into installing it by clicking on embedded links. It hides its presence on the device, seeks accessibility permissions, and can record audio, phone calls, and keystrokes. The malware…

    Read More

  • The Fast Evolution of SaaS Security from 2020 to 2024 (Told Through Video)

    October 16, 2023 at 08:25AM The text discusses the importance of SaaS security and highlights key findings from the SaaS Security Survey Report. It emphasizes the need for automated configuration and monitoring tools, as well as the critical role of identity and access governance. The risks associated with third-party connected apps are also examined. The…

    Read More

  • Microsoft Improving Windows Authentication, Disabling NTLM

    October 16, 2023 at 08:24AM Microsoft is working on new features for Kerberos to improve Windows authentication security and eliminate the use of the NTLM protocol. The features include Initial and Pass Through Authentication Using Kerberos (IAKerb), which allows authentication through a server in firewall segmented environments or remote access scenarios. The second feature is…

    Read More