Navigating Endpoint Privilege Management: Insights for CISOs and Admins

September 10, 2024 at 10:47AM Summary: Endpoint privilege management (EPM) is crucial for cybersecurity, aiming to reduce attack surfaces and insider threats. EPM offers pros like enhanced compliance and improved incident response, but also brings cons such as operational overhead and user productivity impact. The debate over granting administrative rights to end users persists, emphasizing … Read more

Aggressively Monitoring for Changes Is a Key Aspect of Cybersecurity

August 26, 2024 at 10:04AM Cybersecurity defense requires multiple layers to mitigate risks and ensure protection. Key elements include file integrity monitoring, change detection, and a robust change management program. These are essential to thwart threat actors’ attempts and minimize risks by detecting and responding to changes promptly. Employee education and support are crucial for … Read more

CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)

May 10, 2024 at 09:36AM Artificial intelligence (AI) is revolutionizing cybersecurity by outsmarting advanced cyber threats. “The Future of Threat Hunting is Powered by Generative AI” webinar, led by Censys Security Researcher Aidan Holland, will showcase CensysGPT – a cutting-edge tool enabling quicker threat detection, simplified competitor searches, and actionable insights from network data. Attend … Read more

Innovation, Not Regulation, Will Protect Corporations From Deepfakes

May 3, 2024 at 10:04AM High-profile individuals are calling for government regulation of deepfakes, but an open letter suggests innovation, not regulation, as the solution. The letter highlights the rapid proliferation of deepfakes and recent scams, arguing that CEOs and management should take responsibility for defending against deepfakes using advanced authentication, AI tools, and content … Read more

PyPI suspends new user registration to block malware campaign

March 28, 2024 at 02:04PM PyPI, the Python Package Index, has suspended user registrations and new project creation due to an ongoing malware campaign. Threat actors are uploading fake packages to compromise developers, with the latest report from Checkmarx revealing 365 malicious entries and an info-stealer payload. This emphasizes the importance of rigorously verifying open-source … Read more

Five Eyes Agencies Issue New Alert on Chinese APT Volt Typhoon

March 20, 2024 at 08:57AM Government agencies in the US, UK, Canada, Australia, and New Zealand are warning critical infrastructure entities of the threat posed by Chinese state-sponsored group, Volt Typhoon. Following a February advisory, the agencies are offering guidance on defending against the group’s advanced persistent threat (APT) activities, emphasizing cybersecurity, supply chain security, … Read more

3 Ways Businesses Can Overcome the Cybersecurity Skills Shortage

March 18, 2024 at 01:08AM Businesses must creatively defend against cybersecurity threats due to budget constraints and limited skilled talent. It seems that the main takeaway from the meeting notes is that businesses are facing challenges due to budget constraints and a limited supply of skilled talent in defending against cybersecurity threats. The notes emphasize … Read more

Russian APT Turla Wields Novel Backdoor Malware Against Polish NGOs

February 15, 2024 at 10:52AM The Russia-sponsored APT group Turla launched a cyberespionage campaign targeting Polish NGOs, using a new backdoor named “TinyTurla-NG” with modular capabilities. The backdoor allows execution of PowerShell and Windows Command Line Interface commands, and a new implant, TurlaPower-NG, for exfiltrating files. Turla also employs old tactics like compromised WordPress-based websites … Read more

Blackwood hackers hijack WPS Office update to install malware

January 25, 2024 at 03:31PM The advanced threat actor ‘Blackwood’ has been using the NSPX30 malware in cyberespionage attacks since at least 2018. Targeting China, Japan, and the UK, the adversary delivers the malware through legitimate software update mechanisms. NSPX30, an evolved implant with sophisticated capabilities, conceals its activities and intercepts data to evade detection. … Read more

Volt Typhoon-Linked SOHO Botnet Infects Multiple US Gov’t Entities

December 14, 2023 at 05:20PM Lumen’s Black Lotus Labs recently identified the KV-Botnet, a sophisticated Internet of Things (IoT) botnet targeting US government and communications organizations. The botnet infects network devices from various vendors and is connected to the Chinese state-aligned Volt Typhoon threat actor. It features advanced stealth mechanisms and the ability to deploy … Read more