Cybersecurity at a crossroads: Time to shift to an architectural approach

The need for greater scale, intelligence, and automation is driving massive change in security operations and the SIEM market. by Jon Oltsik Contributing Writer According to ESG research, 45% of cybersecurity professionals believe that security operations are more difficult today than they were two years ago, while another 11% claim that […]

read more

Microsoft’s Security Chickens Have Come Home to Roost

By Ryan Naraine: News analysis:  SecurityWeek editor-at-large Ryan Naraine reads the CSRB report on China’s audacious Microsoft’s Exchange Online hack and isn’t at all surprised by the findings. The US government’s public documentation of Microsoft’s shoddy cybersecurity practices, lax corporate culture and untruthfulness in public communications should come as no […]

read more

New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA

New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA                                                                              […]

read more

Cloud Email Filtering Bypass Attack Works 80% of the Time

A majority of enterprises that employ cloud-based email spam filtering services are potentially at risk, thanks to a rampant tendency to misconfigure them. David Strom, Contributing Writer Computer scientists have uncovered a shockingly prevalent misconfiguration in popular enterprise cloud-based email spam filtering services, along with an exploit for taking advantage of […]

read more

CISA publishes 447-page draft of cyber incident reporting rule

By-Jonathan Greig: The nation’s top cybersecurity agency has unveiled the initial draft of a new rule detailing how critical infrastructure organizations need to report cyberattacks to the federal government. The Cybersecurity and Infrastructure Security Agency (CISA) posted the 447-page set of regulations under the Cyber Incident Reporting for Critical Infrastructure Act to […]

read more

StopCrypt: Most widely distributed ransomware evolves to evade detection

By Bill Toulas: A new variant of StopCrypt ransomware (aka STOP) was spotted in the wild, employing a multi-stage execution process that involves shellcodes to evade security tools. StopCrypt, also known as STOP Djvu, is the most widely distributed ransomware in existence that you rarely hear about. While you constantly hear how […]

read more
Trustpilot
Verified by MonsterInsights