The Role of AI in Cybersecurity Operations

AI can analyze data quickly, detect patterns of malicious behavior, and automate routine tasks like alert triaging and ...

New Go-based Backdoor GoGra Targets South Asian Media Organization

An unnamed media organization in South Asia was targeted in November 20233 using a previously undocumented Go-based ...

The Prevalence of DarkComet in Dynamic DNS

A recent analysis using HYAS Insight threat intelligence revealed a trend in dynamic DNS registrations originating from ...

CrowdStrike Reveals Root Cause of Global System Outages

Cybersecurity company CrowdStrike has published its root cause analysis detailing the Falcon Sensor software update ...

Police Recover Over $40m Headed to BEC Scammers

A Singaporean commodity firm has had a narrow escape after police managed to intervene to recover nearly all of the ...

Florida Firm Sued Over Theft of 2.9B Personal Records

A class-action lawsuit is brewing over the cyber-heist of 2.9 billion personal records that were stolen from a Florida ...

CISA Adds Microsoft COM for Windows Bug to its Known Exploited Vulnerabilities Catalog

The vulnerability, tracked as CVE-2018-0824, arises from the deserialization of untrusted data. Microsoft warns that ...

Attackers Use Multiple Techniques to Bypass Reputation-Based Security

Attackers have developed multiple techniques to bypass reputation-based security controls like Windows Smart App ...

1 85 86 87 88 89 90 91 92 93 94 95 667