threat

  • Blog

    Increasing Awareness of DNS Hijacking: A Growing Cyber Threat

    A recent report from Palo Alto Networks’s Unit 42 exposes the persistent and evolving threat of DNS hijacking, a stealthy tactic cybercriminals use to reroute internet traffic. By leveraging passive DNS analysis, the cybersecurity company also provided real-world examples of recent DNS hijacking attacks — highlighting the urgency of countering this hidden danger. What is DNS hijacking? DNS hijacking involves…

    Read More »
  • Blog

    AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

    For the third consecutive quarter, Gartner has found that cyber attacks staged using artificial intelligence are the biggest risk for enterprises. The consulting firm surveyed 286 senior risk and assurance executives from July through September, and 80% cited AI-enhanced malicious attacks as the top threat they were concerned about. This isn’t surprising, as evidence suggests AI-assisted attacks are on the…

    Read More »
  • Blog

    Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

    New research by cybersecurity firm Mandiant provides eyebrow-raising statistics on the exploitation of vulnerabilities by attackers, based on the analysis of 138 different exploited vulnerabilities that were disclosed in 2023. The findings, published on Google Cloud’s blog, reveals that vendors are increasingly being targeted by attackers, who are continually reducing the average time to exploit both zero-day and N-day vulnerabilities.…

    Read More »
  • Blog

    Microsoft logs 600 million identity attacks per day as threat actors collaborate more

    Microsoft has said it tracked more than 600 million identity attacks across its 2024 fiscal year, as the firm warns cybercriminals are becoming more collaborative and focused in their attacks. In its Digital Defense Report 2024, Microsoft noted the rise of identity-based cyber attacks as firms migrate to the cloud and stated that Microsoft Entra data showed 7,000 password attacks…

    Read More »
  • Blog

    OpenAI confirms threat actors use ChatGPT to write malware

    OpenAI has disrupted over 20 malicious cyber operations abusing its AI-powered chatbot, ChatGPT, for debugging and developing malware, spreading misinformation, evading detection, and conducting spear-phishing attacks. The report, which focuses on operations since the beginning of the year, constitutes the first official confirmation that generative mainstream AI tools are used to enhance offensive cyber operations. The first signs of such…

    Read More »
  • Blog

    NCSC warns organizations of cyber threat from Russian Foreign Intelligence

    The National Cyber Security Centre (NCSC) is warning organizations to buckle up for online attacks by Russia’s Foreign Intelligence Service (SVR). More than 20 publicly disclosed vulnerabilities have been listed in a joint advisory of US security agencies. These, it believes, can be exploited by the hacking group, APT29, also known as Midnight Blizzard, the Dukes, and Cozy Bear. The…

    Read More »
  • Blog

    This privacy and compliance threat throws shade at iPhone Mirroring – Computerworld

    Privacy: First, managed workplace Macs are gathering data concerning apps used on personally-owned iPhones, which can be a privacy failure and could be a bigger problem in some contexts. (For instance, an employee in an authoritarian state in which use of VPN or LGBTQ apps is proscribed might find their app use shared by this bug, with potentially serious consequences.)…

    Read More »
  • Blog

    Hurricane’s impact on semiconductor industry remains a threat

    One of two plants that mine high-purity quartz and silica sand needed for the production of semiconductors and other high-tech hardware has reopened oprations after being shut down for more than a week. Sibelco today announced the restart of production at its Spruce Pine, NC mining and processing operations following the disruption caused by Hurricane Helene, the company said in…

    Read More »
  • Blog

    Hybrid cloud environments are under serious threat from hackers – here’s what you need to know

    Microsoft says it’s identified a financially motivated cyber criminal group that uses open source tools to target hybrid cloud environments. Known as ‘Storm-0501’, the group has been hitting a range of US organizations, including government, manufacturing, transportation, and law enforcement, carrying out data exfiltration, credential theft, tampering, persistent backdoor access, and ransomware attacks. First spotted in 2021, the group first…

    Read More »
  • Blog

    Top 7 Cyber Threat Hunting Tools Reviewed by Experts for 2024

    Cyber threat hunting is a proactive security measure taken to detect and neutralize potential threats on a network before they cause significant damage. To seek out this type of threat, security professionals use cyber threat-hunting tools. These are software solutions driven by advanced analytics, machine learning, and artificial intelligence to detect abnormal patterns in a system’s network and endpoints. They…

    Read More »
Back to top button
close