The CTI Process Hyperloop: A Practical Implementation of the CTI Process Lifecycle
The Intelligence Hyperloop uses the Cyber Threat Intelligence (CTI) Process Lifecycle, a cyclical method that covers planning, collection, processing, analysis, production and dissemination. This model can be implemented on both tactical and strategic levels. Before defining the process, the mission and purpose of the CTI program should be established. Divided into strategic and tactical phases, […]
New Research from Illumio Shows Nearly Half of All Data Breaches Originate in the Cloud, Costing Organizations $4.1 Million on Average
New research by Illumio indicates that almost half of all data breaches stem from the cloud, costing businesses an average of $4.1 million.
MySQL Servers, Docker Hosts Infected With DDoS Malware
MySQL servers and Docker hosts are being targeted for malware attacks resulting in distributed denial-of-service (DDoS) incidents, according to a warning from AhnLab Security Emergency Response Center. Vulnerable MySQL systems are being infected with the Ddostf botnet, predominantly by attackers seeking out weak credentials or recognised weaknesses. In addition, the OracleIV DDoS-capable malware is being used […]
How biometrics, internet of things and AI will shape our future security
Toby Lewis, Global Head of Threat Analysis at Darktrace, discussed threats posed by the Internet of Things (IoT) and the future of cybersecurity in an interview with SiliconRepublic.com. Lewis noted that IoT devices can be difficult to secure, and that cybercriminals could use them to attack other network systems. Additionally, he warned that ransomware attacks […]
New non-profit seeks to get justice for cybercrime victims
Non-profit Intelligence for Good aims to counter cybercrime by analysing data from victims, industry and open sources to expose malicious individuals and networks. Its methods include connecting victims to support and recovery groups, supplementing law enforcement efforts, and supplying legal teams with adequate resources for prosecution. The organisation recently won an October 2023 Gula Tech […]
What Does PCI DSS 4.0 Mean for API?
PCI DSS 4.0, the latest version of the Payment Card Industry Data Security Standard, has been released by the PCI Security Standards Council in May 2022. It includes new requirements for all organizations dealing with payment card data. The new version stresses viewing card security as an ongoing process and allows customizable security controls. It […]
Kaspersky releases predictions for Advanced Threats Landscape in 2024
Cybersecurity company Kaspersky’s Global Research and Analysis Team predicts that Advanced Persistent Threat (APT) actors will utilize AI for spear phishing and create new exploits for mobile, wearables, and smart devices in 2024. They are also expected to build botnets and improve supply chain invasion tactics. Kaspersky experts anticipate an increase in politically driven attacks, […]
Kaspersky releases predictions for Advanced Threats Landscape in 2024
Kaspersky’s Global Research and Analysis Team has issued its predictions for 2024’s Advanced Persistent Threats (APTs). It anticipates an increase in exploits on mobile, wearables, and smart devices used to create botnets, more refined supply chain attack methods, and AI utilization for effective spear phishing. These advancements are likely to intensify politically motivated attacks and […]
Varonis Adds Generative AI Capabilities to Leading Data
Varonis Systems, Inc. is enhancing its data security with the introduction of Athena AI. It provides users with AI and machine learning capabilities that transform security operations, from visibility to remediation. The Athena AI layer, which incorporates two generative AI features, enables users to conduct thorough inquiries and analyses using natural language. This addition enhances […]
New Research from Illumio Shows Nearly Half of All Data
Illumio’s global research shows that 47% of data breaches originated in the cloud last year, costing organizations an average of $4.1 million each. Traditional cloud security tools are failing to keep up, increasing the risks of storing sensitive information in the cloud. However, 97% of respondents believe Zero Trust Segmentation (ZTS) can greatly improve their […]