Top Challenges Threat Hunting Teams Face in 2023 and How to Overcome Them
Back view of dangerous team of hackers working on a new malware. By David Monnier, Chief Evangelist, Team Cymru Fellow It’s challenging to be on…
Back view of dangerous team of hackers working on a new malware. By David Monnier, Chief Evangelist, Team Cymru Fellow It’s challenging to be on…
By Jaye Tillson, Director of Strategy, Axis Security Over the past few years, our world has evolved at a rapid pace. This rapid evolution has…
By Sreenivas Gukal, Head of Products, VP of Engineering, and Co-Founder at Acalvio Technologies Enterprises and regulated industries are becoming well aware that their risk…
Collaborative Efforts Dismantle Qakbot Malware’s IT Infrastructure In a significant joint operation, the FBI, in partnership with the Department of Justice and international allies, has…
In the ever-evolving landscape of cyber threats, one form of digital menace has gained significant notoriety: ransomware malware. These malicious programs encrypt victims’ data and…
Over the past 48 hours, media outlets have been abuzz with reports of Russian cyber-attacks targeting government websites. However, what remains shrouded in relative obscurity…
[ This article was originally published here ] The content of this post is solely the responsibility of the author. AT&T does not adopt or…
In November of the previous year, Rackspace, a well-known company providing cloud computing services, fell victim to a cyber-attack orchestrated by the Play Ransomware group.…
Business network background, connecting dots, technology design By Doug Dooley, COO, Data Theorem The rise of cloud-native applications has revolutionized the way businesses operate, enabling…
By Richard Bird, Chief Security Officer at Traceable In the ever-evolving landscape of cybersecurity, it’s concerning to witness a persistent rise in breaches. The underlying issue? The consistent sidelining of API security. Despite the transformative role APIs play in…
In the complex field of application security, the challenges surrounding open source software security require innovative solutions. In a recent interview with Varun Badhwar, Founder…
Security Operations Centers (SOCs) are the heart of cybersecurity, but managing the endless stream of alerts, conducting in-depth investigations, and timely response to incidents are…