Mandiant/Google Cloud’s Jill C. Tyson offers up timelines, checklists, and other guidance around enterprise-wide readiness to ensure compliance with the new rule.
Read moreKinsing Cyberattackers Debut ‘Looney Tunables’ Cloud Exploits
November 7 2023Admins need to patch immediately, as the prolific cybercrime group pivots from cryptomining to going after cloud secrets and credentials.
Read morePreviously limited to initial access brokering, the Gootloader group has pivoted to a nasty post-compromise "GootBot" attack, each implant with its own C2.
Read moreVirtual Kidnapping: AI Tools Are Enabling IRL Extortion Scams
November 7 2023With AI and publicly available data, cybercriminals have the resources they need to fake a real-life kidnapping and make you believe it.
Read moreNovel Google Cloud RAT Uses Calendar Events for C2
November 7 2023Cybercriminals are abusing legitimate functions within cloud services, and providers can't totally stop them, especially when it comes to innovative approaches like this.
Read moreUS Sanctions Ryuk Ransomware’s Russian Money Launderer
November 7 2023Woman is accused of assisting Russian oligarchs and ransomware affiliates with schemes to evade sanctions.
Read moreName That Edge Toon: Out for the Count
November 7 2023Come up with a clever cybersecurity-related caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreMiddle East’s 5G Acceleration May Pose Serious Security Issues
November 7 2023Telcos across the Middle East are rapidly rolling out 5G networks. Will this accelerated adoption lead to higher security vulnerabilities?
Read more
Recent Comments