Every year, our experts put their heads together to anticipate and prepare for what's to come next in the world of cybersecurity. This 2022 Cybersecurity Predictions white paper highlights our retrospective on the months past and analyzes impactful developments, breaches, and tactics.
This paper also...
It is time to get on the serverless train. Forrester predicts that 25% of developers will be using serverless technologies by next year. But legacy application security testing (AST) tools cannot scale to support serverless applications—failing to address the speed and accuracy they demand. Read this white paper to...
Serverless ratchets up digital transformation, but application security remains a critical hurdle. Nearly three-quarters of survey respondents say 6+ development teams are involved in serverless application development in their organizations. Over two-thirds cite security as important or very important to their...
In the wake of the explosive Apache Log4j vulnerabilities, the White House hosted tech leaders and federal agencies in a summit to discuss ways to improve open-source software security. The meeting was hosted by Deputy National Security Adviser for Cyber and Emergency Technology Anne Neuberger.
Maryland officials confirm that a December cyberattack on the state's health department, which is still disrupting some services, involved ransomware - but that no ransom was paid. Also, lawsuits have been filed against a Florida specialty pharmacy in the wake of a November cyber incident.
Police in Ukraine have arrested five individuals on suspicion of using ransomware to extort more than 50 companies across the United States and Europe, as well as to provide an IP-changing service to international hackers to help them distribute malware, steal sensitive data and disrupt sites.
Amid a surge in cryptocurrency investment - particularly across DeFi - blockchain experts warn that lax security was a main factor in $1.3 billion in cryptoassets being lost to hacks, exploits and scams in 2021. The losses, according to CertiK, rose from $500 million in 2020.
Healthcare and public health sector entities must heed the warnings this week by federal authorities of Russian state-sponsored cyberthreats to critical infrastructure organizations, some experts say. Why are the stakes so high?
Attackers wielding Night Sky ransomware are among the latest groups that have been attempting to exploit critical vulnerabilities in widely used Apache Log4j software. Microsoft says that among other attacks, a China-based ransomware operator has been exploiting Log4j flaws in VMware Horizon.
In today’s highly interconnected worlds, CISOs face a dual challenge: protecting data and
reporting to the Board of Directors. Log management has long been a tool in the CISO’s back
pocket, helping gain insight into potential security issues. However, the rise of cloud-based
infrastructures changes this, making...
A vendor that provides clinical reviews notified nearly 135,000 individuals and dozens of clients of a cyberattack involving the exploitation of a product vulnerability and data exfiltration. Experts say the incident is the latest reminder of the importance of comprehensive vulnerability management.
The U.S. Cybersecurity and Infrastructure Security Agency, FBI and National Security Agency warn in a joint advisory that state-sponsored Russian attackers are actively exploiting and seeking to cause disruption to critical infrastructure, and it urges defenders to mitigate commonly seen attack vectors.
Cybercrime gang FIN7 is impersonating the U.S. Department of Health and Human Services and Amazon to trick enterprises in the U.S. into using a malicious flash drive, according to the FBI. The threat actor targeted undisclosed companies in the transportation, defense and insurance sectors.
If you can quickly identify the signals of a ransomware attack in your environment, that will be your best chance possible to stop it. So, how do we do that?
Download this eBook and learn:
How to stop disastrous business disruption before ransomware gets deployed;
Why hunting for ransomware won’t work;
The Cyberspace Administration of China's new regulation for companies that offer algorithm-based recommendation services has been met with caution. Some statements in the regulation, which is to go into effect on March 1, are vague enough to be abused, and confidentiality is also a concern.