State hackers turn to massive ORB proxy networks to evade detection

May 22, 2024 at 01:40PM China-linked state-backed hackers are using operational relay box (ORB) networks as proxy meshes for cyberespionage operations. These ORBs involve hybrid combinations of VPS services and compromised IoT devices. Two networks, ORB3/SPACEHOP and ORB2/FLORAHOX, are being used for reconnaissance and vulnerability exploitation, creating challenges for detection and attribution. Attackers are evading … Read more

AI Gives Defenders the Advantage in Enterprise Defense

January 19, 2024 at 02:46PM The International Conference on Cyber Security at Fordham University highlighted the increasing use of AI for enterprise defense against adversaries. While CISOs acknowledge the importance of AI, they are also prioritizing supply chain security, authentication technologies, and addressing the implications of global conflicts on critical infrastructure. CISOs believe AI provides … Read more

Top Guns: Defending Corporate Clouds from Malicious Mavericks

December 4, 2023 at 11:50AM Applications and cloud infrastructure, despite having distinct risk profiles and security needs, should be integrated into a cohesive enterprise defense strategy. (Note: The title “Top Guns: Defending Corporate Clouds from Malicious Mavericks” and the source “SecurityWeek” were not included in the summary as they are considered metadata rather than content … Read more