Hackers targeted telecommunications companies in Thailand with a Linux remote access Trojan designed to attack different versions of the open-source kernel, researchers say. Dubbed "Krasue," the malware poses a "severe risk to critical systems and sensitive data," says Group-IB researchers.
Many government and higher ed organizations are focusing on log management to reduce risk, accelerate remediation, and comply with regulations. But logging can come with challenges, such as difficulties ingesting data, slow access to historical data, and tool sprawl.
Your brand is the face of your company. Building and maintaining brand trust over time is crucial. Unfortunately, it only takes one cyberattack or online brand impersonation to lose that trust.
To help you choose the right brand protection vendor, check our this buyers guide to learn:
How to protect your brand...
The ever-expanding threat landscape keeps evolving, and it is easy to overlook key areas that could expose your organization. However, you can stay ahead of constantly evolving threats and gain peace of mind with this comprehensive checklist.
These recommendations are based on real-time incident response...
The Digital Risk Protection field is rapidly changing and it can be hard to distinguish between different solutions that come on the market.
In this guide, you’ll learn:
Breadth of social and digital platforms monitored;
Protection of the complete digital footprint;
AI-based tools for advanced collection and...
Protecting your domain is a crucial part of protecting your brand online. Here’s how to find the right domain protection vendor (even if it’s not us).
Bad actors want to exploit your customers, and they’ll use your own branding against you. In fact, there’s been a 40% Increase in alerts for malicious or...
You know you need a Digital Risk Protection platform, but you’re not sure where to start. We’ve got you covered.
Every organization with a digital footprint – which is virtually every business today – faces established and emerging online threats. In fact, the average company is targeted nearly three times...
AI is being used "by everyone" these days, including by malicious nation-state actors, and that is raising the level of threats and risks facing hospitals and other healthcare entities, said John Riggi, national adviser for cybersecurity and risk at the American Hospital Association.
Dive into the exciting intersection of innovation and security! Join this session to unlock the secrets of securing your code while harnessing AI's potential. Explore parallels between past open source security concerns and today's AI-generated code anxieties, and where AI can play a role in securing your...
AI weaponization, zero days, 'we the people' attacks - these are among the threats projected for 2024 in Fortinet's FortiGuard Labs’ 2024 Threat Predictions. Derek Manky shares insight and analysis on what to expect to defend against in the New Year.
Tool sprawl was an issue before digital transformation and the move to modernization. But now the challenge is amplified, says Jay Livens of Dynatrace. But there is an alternative to tool sprawl, Livens says. He describes a new approach to managing cybersecurity solutions.
Threat actors are exploiting another zero-day flaw in Cisco's IOS XE software to implant a malicious backdoor. The IOS XE operating system runs on a wide range of Cisco networking devices, including routers, switches, wireless controllers, access points and more.
The biggest challenges in threat detection and response today are the inability to cover the entire attack surface and a lack of insight into who is attacking and why. To address these issues, Cisco introduced Breach Protection, a suite of products that combines email, endpoint and XDR protection.
Artificial Intelligence (AI) has come roaring to the forefront of today’s technology landscape. It has revolutionized industries and will modernize careers, bringing numerous benefits and advancements to our daily lives. However, it is crucial to recognize that AI also introduces unseen impacts that must be...