The field of cybersecurity is constantly evolving due to the rapid advancements in technology and the constantly changing threat of cybercrime. To stay informed and be prepared for the future, it is important to understand what experts predict for cybersecurity in...
Artificial intelligence (AI) has become commonplace in many aspects of our lives in recent years. We have seen AI used to automate customer service helplines, improve the accuracy of facial recognition software, and even power self-driving cars. However, a newer form...
The Biden Administration is set to release a comprehensive National Cyber Strategy that will work to strengthen the security of our nation’s digital infrastructure and protect us from malicious cyber threats. This strategy comes when cybersecurity is more...
For most Americans, the holidays are full of shopping, festive candlelight dinners, and family gatherings. However, for some consumers, one number on their credit card statement stands out among all those other numbers—the dollar amount from unauthorized charges made...
A security breach has been discovered within the LastPass password manager service. More information to come in the coming weeks. Keep your LastPass account safe by changing your master password and creating a new unique one-time recovery key. The LastPass team is...
Twilio and Cloudfare employees have seen targeted attacks against them in a much larger phishing campaign. The phishing campaign has successfully compromised 9,931 accounts across 130 different organizations. The campaign focused on the abuse of identity and access...
An ongoing supply chain attack has seen the spread of the W4SP Stealer virus. So far, the malicious Python packages have infected over 100 persons. In a technical write-up, Checkmarx researcher Josef Harush echoes that the threat actor is still active and sending out...
Both large and medium-sized organizations need help to offset increasing data losses and a steep increase in downtime. As if this was not enough, organizations must also be content with high recovery costs after a cyber-attack. A cyberattack costs an organization...
Sullivan was arrested and charged with two felonies: obstruction of justice and misprision. During his tenure as Chief Security Officer (CSO) at Uber (April 2015–November 2017), the firm suffered a data breach in which over 50 million customers and drivers’...
Microsoft’s Mark of the Web (MOTW) is a security feature that prevents malicious files and attachments from being downloaded or opened. However, two independent vulnerabilities exist in various versions of Windows that allow attackers to bypass this protection....
This year has seen the first significant update to ISO 27002 since 2013. These modifications reflect in Annex A’s security controls for organizations with ISO 27001 certification. ISO 27001 is a standard for ISMS (information security management systems) that...
Venafi, a company that makes artificial ID solutions, recently conducted a study to learn more about the effects of cloud complexities on cybersecurity. According to a poll conducted by Venafi among 1,101 security decision-makers (SDMs) at enterprises with over 1,000...