Anetac Emerges From Stealth Mode With $16 Million in Funding

May 6, 2024 at 09:15AM Anetac, a Silicon Valley startup, has revealed its platform for managing non-human identities and secured $16 million in funding led by Liberty Global. The company’s Dynamic Identity and Security Platform offers real-time visibility into API and access keys, service accounts, and tokens. Anetac’s solution is already being used by various … Read more

Ransomware Double-Dip: Re-Victimization in Cyber Extortion

April 22, 2024 at 07:06AM This text summarizes a report on Cyber Extortion and Ransomware threat landscape, focusing on re-victimization and the impact of law enforcement efforts. It discusses the increase in cybercrime, challenges in monitoring victimization, and the role of affiliates in facilitating cyber-attacks. The report also highlights the unpredictability and complexity of the … Read more

Cybercriminals Weigh Options for Using LLMs: Buy, Build, or Break?

April 1, 2024 at 05:07PM Cybercriminals pose a threat by coercing legitimate AI models to turn malicious, but the greater danger lies in their creation of malicious chatbot platforms and the use of open source models. Based on the meeting notes, it seems that there are concerns about cybercriminals bypassing security measures to manipulate legitimate … Read more

4 Ways Organizations Can Drive Demand for Software Security Training

February 27, 2024 at 01:06PM Summary: The cybersecurity landscape for organizations creating their own software is increasingly risky due to various forces. There is a shortage of skilled cybersecurity personnel, a worsening threat landscape, and potential legislative changes. Companies can address this by empowering their developers through secure coding, security training, identifying champions, offering incentives, … Read more

BumbleBee Malware Buzzes Back on the Scene After 4-Month Hiatus

February 14, 2024 at 11:59AM The Bumblebee loader, known for delivering various malware, has reappeared in the US targeting organizations after a four-month hiatus. The recent campaign uses email with OneDrive URLs to initiate attacks, signaling a surge in cybercriminal activity. Interestingly, the attackers have employed VBA macro-enabled documents, a tactic rarely used since Microsoft’s … Read more

With Attacks on the Upswing, Cyber-Insurance Premiums Poised to Rise Too

January 18, 2024 at 12:04PM The cyber-insurance market is expected to see rising claim volumes due to increasing threat activities, potentially leading to higher premiums in the next 12 to 24 months. Despite recent declines in average prices, industry experts anticipate a shift towards increased costs as the threat landscape evolves. While costs temporarily eased … Read more

Ivanti Zero-Day Exploits Skyrocket Worldwide; No Patches Yet

January 16, 2024 at 04:34PM Ivanti VPNs globally compromised due to two unpatched zero-day vulnerabilities, allowing attackers to gain network access. Thousands infected, primarily by group UTA0178, with no available patches until Jan. 22 and Feb. 19. Ivanti released a mitigation and Integrity Checker Tool for existing compromises. Customers advised to follow incident response playbook … Read more

As Enterprise Cloud Grows, So Do Challenges

January 15, 2024 at 11:31PM As children grow, their problems become more complex, resembling the challenges faced by maturing enterprises. The evolving technology landscape necessitates a strategic distributed cloud platform partner to manage complexity, facilitate vendor consolidation, handle mergers/acquisitions, cope with innovation pressure, and combat the evolving threat landscape for improved security and simplified management. … Read more

Decoy Microsoft Word Documents Used to Deliver Nim-Based Malware

December 22, 2023 at 08:00AM A recent phishing campaign employs decoy Microsoft Word documents to distribute Nim-based malware. The backdoor lures victims to enable macros, then establishes a connection with a remote server disguised as a Nepali government entity. This comes amidst increased distribution of various malware strains and social engineering campaigns leveraging new tactics. … Read more

Humans Are Notoriously Bad at Assessing Risk

November 22, 2023 at 07:12AM Risk assessment can be subjective and biased due to human emotions, which can lead to an inaccurate representation of reality and a weaker security posture. To remove subjectivity, security professionals should follow seven steps: identify critical resources and data, understand potential financial impact, enumerate relevant threats, map risks to resources, … Read more