With 80% of companies using cloud collaboration tools, cybercriminals are using multichannel phishing attacks to exploit security gaps in the hybrid work model.
from Dark Reading https://ift.tt/R1PCEyF
via IFTTT
With 80% of companies using cloud collaboration tools, cybercriminals are using multichannel phishing attacks to exploit security gaps in the hybrid work model.
from Dark Reading https://ift.tt/R1PCEyF
via IFTTT
Researcher to reveal fresh details at Black Hat Asia on a tenacious cyber-espionage group attacking specific military, law enforcement, aviation, and other entities in Central and South Asia.
from Dark Reading https://ift.tt/7d9mxYX
via IFTTT
Cloud containers are increasingly part of the cybercrime playbook, with researchers flagging ongoing scanning for Docker weaknesses along with rapid exploitation to infect systems with coin-miners, denial-of-service tools, and ransomware.
from Dark Reading https://ift.tt/nJtsB8x
via IFTTT
As the gaming sector booms, game publishers and gaming networks have been heavily targeted with distributed denial-of-service (DDoS) attacks in the last year.
from Dark Reading https://ift.tt/H6KXs42
via IFTTT
All active GitHub users who contribute code will be required to enable at least one form of two-factor authentication by the end of 2023.
from Dark Reading https://ift.tt/cYjGKqT
via IFTTT
Operation CuckooBees uncovered the state-sponsored group’s sophisticated new tactics in a years-long campaign that hit more than 30 tech and manufacturing companies.
from Dark Reading https://ift.tt/NX0RehU
via IFTTT
Microsoft’s stand-alone version of Defender for SMBs promises to help SecOps teams automate detection, response, and recovery.
from Dark Reading https://ift.tt/iqa2Twn
via IFTTT
The US has to adapt its own policies to counter the push, warns former DocuSign CEO and Under Secretary of State Keith Krach.
from Dark Reading https://ift.tt/Q5096EW
via IFTTT
Researchers use code, Bitcoin transactions to link ransomware attacks on banks to DPRK-sponsored actors.
from Dark Reading https://ift.tt/FHsvAku
via IFTTT
A company’s response to a breach is more important than almost anything else. But what constitutes a “good” response following a security incident? (Part 2 of a series.)
from Dark Reading https://ift.tt/w9YpD0E
via IFTTT