Threat groups using AI to speed up and scale cyberattacks
Hackers are using ransomware to accelerate the timeline for cyberattacks, moving on average four times faster than just a year ago, according to an incident…
Hackers are using ransomware to accelerate the timeline for cyberattacks, moving on average four times faster than just a year ago, according to an incident…
Dive Brief: Businesses need to pay attention to identity security and third-party risk management to avoid falling prey to hackers whose techniques have evolved, the…
Threat actors are weaponizing a zero-day vulnerability in Dell RecoverPoint for Virtual Machines in a cyberattack campaign that drops a novel backdoor, according to new…
Security researchers identified three new threat groups that either provided access to or launched direct attacks against operational technology environments, according to a report released…
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Data-only extortion attacks surged elevenfold…
As AI adoption deepens, security teams face a tricky dilemma: how to move quickly while managing new security, privacy, and data exposure risks. Tines’ Voice…
The question isn’t whether AI agents will operate in your enterprise – it’s when, and under what conditions. As organizations move from experimentation to production deployment,…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Dive Insight: There were nearly…
A critical vulnerability in BeyondTrust Remote Support is facing a surge in reconnaissance activity in preparation for more targeted exploitation, according to security researchers. The…
The Cybersecurity and Infrastructure Security Agency is preparing employees for a reorganization that will reduce the depleted agency’s focus on certain missions in order to…
Security researchers warn that threat groups are exploiting critical vulnerabilities in SmarterMail, a business email and collaboration server that small to medium-sized businesses use as…
The Cybersecurity and Infrastructure Security Agency wants critical infrastructure partners’ feedback on the scope of its cyber-incident reporting regulation as the agency homes in on…