New ransomware, infostealers pose growing risk in 2024

BlackBerry detected and stopped 3.1 million cyberattacks (37,000 per day) in the first quarter of 2024. Between January and March 2024, BlackBerry detected 630,000 malicious hashes, representing a 40%... Read more »

75% of new vulnerabilities exploited within 19 days

Last year alone, over 30,000 new vulnerabilities were published, with a new vulnerability emerging approximately every 17 minutes — averaging 600 new vulnerabilities per week, according to Skybox Security.... Read more »

Enterprises increasingly turn to cloud and AI for database management

Across various tasks, from predictive analytics to code generation, organizations in all sectors are exploring how AI can add value and increase efficiency. In this Help Net Security video,... Read more »

New MOVEit Transfer critical bug is actively exploited

Experts warn of active exploitation of a critical authentication bypass vulnerability in MOVEit Transfer file transfer software. Progress Software addressed two critical authentication bypass vulnerabilities, tracked as CVE-2024-5805 and CVE-2024-5806, affecting... Read more »

Cofense enhances PhishMe to identify engagement and resilience gaps across all employee levels

Cofense unveiled new enhancements to its PhishMe Employee Security Awareness Training (SAT) Platform. The latest addition, Employee Engagement Index, is set to transform how organizations manage email security risks.... Read more »

ARMO launches behavioral-based cloud detection and response

ARMO announced its new ARMO Cloud Detection & Response solution, providing robust security for workloads. This new offering addresses the residual threats that may persist during runtime, even after... Read more »

Malware peddlers experimenting with BPL sideloading and masking malicious payloads as PGP keys

A newly spotted campaign is leveraging BPL sideloading and other uncommon tricks to deliver the IDAT Loader (aka HijackLoader) malware and prevent its detection. The campaign Spotted by Kroll’s... Read more »

Developer errors lead to long-term exposure of sensitive data in Git repos

Credentials, API tokens, and passkeys – collectively referred to as secrets – from organizations around the globe were exposed for years, according to Aqua Security’s latest research. By scanning... Read more »

New Caesar Cipher Skimmer targets popular CMS used by e-stores

A new e-skimmer called Caesar Cipher Skimmer is used to compromise multiple CMS, including WordPress, Magento, and OpenCart. Sucuri researchers discovered a new e-skimmer, called Caesar Cipher Skimmer, that... Read more »

Business Email Compromise Attacks Are Evolving: How Organizations Can Stay Ahead of the Curve

Email-based cyberattacks are rampant. If we go by figures, the U.S. Cybersecurity and Infrastructure Security Agency reports that 90% of successful cyberattacks begin with phishing emails. While phishing emails... Read more »
Subscribe to our Newsletter