Publisher’s Spotlight: Checkmarx
23
Aug
2024

Publisher’s Spotlight: Checkmarx – Cyber Defense Magazine

I was thrilled to catch up with Checkmarx during Black Hat USA 2024.  Cloud development transformation has ushered in a…

Naveen Goud
23
Aug
2024

Ransomware hits in these specific timings and steals data from Google Chrome

In recent discussions, we’ve explored how ransomware attacks are carried out, their common targets, and the impact on affected companies….

The changing dynamics of ransomware as law enforcement strikes
23
Aug
2024

The changing dynamics of ransomware as law enforcement strikes

After peaking in late 2023, the ransomware industry is beginning to stabilize in productivity, with notable developments in ransomware targets,…

macOS Malware
23
Aug
2024

New macOS Malware “Cthulhu Stealer” Targets Apple Users’ Data

Aug 23, 2024Ravie LakshmananEndpoint Security / Data Privacy Cybersecurity researchers have uncovered a new information stealer that’s designed to target…

Vulnerability prioritization is only the beginning
23
Aug
2024

Vulnerability prioritization is only the beginning

To date, most technology solutions focused on vulnerability management have focused on the prioritization of risks. That usually took the…

Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware
23
Aug
2024

INE Security Launches Initiatives to Invest in the Education of Aspiring Cybersecurity Professionals

INE Security, a global cybersecurity training and certification provider, recently launched initiatives with several higher education institutions in an ongoing…

Fraud tactics and the growing prevalence of AI scams
23
Aug
2024

Fraud tactics and the growing prevalence of AI scams

In the first six months of 2024, Hiya flagged nearly 20 billion calls as suspected spam – more than 107…

Chinese Hackers Exploiting Zero-Day Flaw in Cisco Switches to Deploy Malware
23
Aug
2024

Chinese Hackers Exploiting Zero-Day Flaw in Cisco Switches

A sophisticated China-linked cyber espionage group, known as Velvet Ant, has been discovered exploiting a zero-day vulnerability in Cisco NX-OS…

Innovator Spotlight: Reach Security
23
Aug
2024

Innovator Spotlight: Reach Security – Cyber Defense Magazine

Despite the increasing number of cybersecurity tools available, attacks continue to succeed at an alarming rate. Studies show that more…

Innovator Spotlight: SecPod
23
Aug
2024

Innovator Spotlight: SecPod – Cyber Defense Magazine

Vulnerability management has become more critical than ever as the global cost of cybercrime is projected to reach $10.5 trillion…

Jane Devry
23
Aug
2024

Is your organisation at risk?

As security and identity management become increasingly more complex with 60% of breaches attributed to insider threats, compromising on access…

New infosec products of the week: August 23, 2024
23
Aug
2024

New infosec products of the week: August 23, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Entrust, Fortanix, McAfee, Own, RightCrowd,…