The Department of Justice announced Tuesday that it has seized two domains that were used during a recent phishing campaign that targeted a marketing firm used by the U.S. Agency for International Development - USAID - to send malicious messages to thousands of potential victims.
A Russian group that was behind the massive SolarWinds supply chain attack has returned with a fresh phishing campaign, according to Microsoft. This new campaign compromised a marketing firm used by the U.S. Agency for International Development - USAID - to send malicious messages to thousands.
The key to reducing "alert fatigue" is to make sure alerts are repeatedly validated before they're distributed, says Chris Kubic, CISO at Fidelis Cybersecurity, who formerly served as CISO at the U.S. National Security Agency.
A threat group likely operating from Iran has been attacking Israeli targets for more than a year with the wiper variants Apostle and Deadwood, masking the intrusions as ransomware attacks to confuse defenders, according to SentinelOne.
Get proven success factors for your security program based on data from 4,800 security experts
We asked respondents about their organization’s adherence to 25 security practices spanning governance, strategy, spending, architecture, and operations.
We then asked about each program’s level of success across...
How can you possibly protect your applications if you can’t react with the same speed?
Real-time attack prevention requires a security solution that enables both speed of visibility and control.
API-enabled security workflows are critical to gaining visibility and fast response to threats: alerts and...
This guide offers examples, recommendations and advice to ensure you stay unaffected by the constantly evolving ransomware menace.
Download the guide and learn about:
Planning for a ransomware incident;
Responding to a ransomware incident;
Prevention: reducing your attack surface.
You can see it in the latest high-profile attacks: Security requirements are ever more complex, exceeding the capacity of current protection capabilities. Enterprises need a new strategy for defending entry points, and Tom Sego of BlastWave believes he has it.
SolarWinds has uncovered evidence that intruders were in its systems in January 2019, about eight months earlier than originally believed. CEO Sudhakar Ramakrishna says the company discovered the clues by analyzing terabytes of data from its virtual build systems.
Investigators at industrial cybersecurity specialist Dragos say an employee of the water treatment plant in Oldsmar, Florida, where a cyberattack was thwarted, had visited an infected website the same day, but that apparently played no role in the security incident.
A recent study showed that even though 82% of cybersecurity professionals are familiar with the MITRE ATT&CK framework, only 8% said they used it regularly. This led to development of the new MITRE ATT&CK Defender training and certification. Rick Gordon of MITRE Engenuity explains.
Security orchestration, automation and response technologies, or SOAR, give organizations the ability to manage an increasing number of alerts. But security experts say there's no worry that SOAR will replace people. In fact, SOAR could help with staff retention.
It’s highly likely that if you are doing the same thing over and over with your current security platform and expecting a different and better outcome, you are not going to be successful protecting your organization.
Criminals continue to innovate with highly-sophisticated and new attack methods, yet many...
Security breaches are inevitable in today’s environment of nation-state attacks and organized crime. When you are breached, minimizing financial and reputational damage depends on detecting, investigating, and remediating attacks fast.
Read this solution brief to understand how you can transform your security...