The Abnormal Security team just launched a new threat intel site named Abnormal Intelligence. Crane Hassold shares resources available, including an attack library, semiannual threat intel reports, a glossary and exclusive insights from the Abnormal team.
A phishing and fraud prevention vendor has bought a startup founded by Qualys' longtime engineering leader to help organizations more effectively discover and monitor assets. Red Sift says its purchase of Hardenize will help customers assess the security of their digital asset inventory.
For this edition of the “Cloud Threat Report,” the Unit 42 Cloud Threat Research team wanted to understand how cloud security teams today implement IAM and where the gaps in protection are.
The result? Bad actors have an open door to utilize cloud-specific tactics, techniques and procedures (TTPs) to gain...
In this episode of "Cybersecurity Unplugged," Amit Shah, director of product marketing at Dynatrace, discusses the implications of the Log4Shell software vulnerability and the need for organizations to take an observability-led approach to software development and security going forward.
Qualys has purchased a startup founded by longtime Qualcomm leaders to help detect supply chain infections, crypto miners and unauthorized activity in the cloud. The deal will allow customers to detect active exploitation, identify advanced threats and create an adaptive risk mitigation program.
With so much of the world now working remotely, the playing field for cyberattacks has never been bigger. And how companies respond to security incidents has never been more important. In this eBook, we’ll discuss five ways you can navigate the choppier waters of cyberthreats. You’ll discover why it’s critical...
The United States is arguably involved in a cyberwar against Russia and China - and appears to be losing. In this episode of "Cybersecurity Unplugged," Tom Kellerman of Contrast Security and Richard Bird of Traceable.ai discuss what the U.S. government and companies need to do to win this cyberwar.
Ransomware actors have intensified their attack campaigns by threatening critical infrastructure shutdowns, risking public health and safety, diverting vital public resources, and impacting data privacy.
Early detection of the intrusion allows an organization to accelerate their response, minimize the impact of...
It’s estimated that 300,000 new pieces of malware are created and an average of 30,000 websites are hacked every day, a speed that makes it very challenging for security systems to recognize the newest threats.
By examining trends in ransomware targets, it is becoming clear that some threat actors are motivated...
A compromise assessment answers the all-important question: Have you been breached? Even the most secure organizations routinely commission such assessments because attacks evolve, and corporate security cannot always keep up.
Download this whitepaper to learn more about:
Lifecycle of a targeted attack;
...
Too often when software developers change jobs, they take source code they've written with them, feeling the code belongs to them even if it belongs to an employer. Code42's Joe Payne shares the challenges of detecting source code theft and ways to protect intellectual property wherever it resides.
Private equity firm Vector Capital invested $100 million in Malwarebytes a month after the antivirus stalwart laid off 125 employees to focus on smaller customers. The funds will help the vendor reduce clients' attack surfaces and accelerate momentum with MSPs and channel partners.
Darktrace's Cybersprint acquisition allowed the cybersecurity AI vendor to move from focusing solely on internal threats to also defending the external attack surface, Nicole Eagan says. The company says AI will give an outside-in view of the victim and simulate how the attacker will behave.
Microsoft provides a range of effective security tools to protect your business from cybersecurity attacks across the threat landscape. In this webinar, we’ll discuss how to operationalize these tools and use them to their maximum efficiency, including implementation and management and resources and services such as...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.