Tag: Cyber
-
Symbiote Linux malware uses sophisticated techniques to hide and steal credentials
A recemtly discovered form of malware that infects Linux systems uses sophisticated techniques to hide and steal credentials. As detailed …
-
#RSAC: Funding Cyber Civil Defense to Help Improve the State of Security
Craig Newmark is well known for his eponymous Craig’s List site, which made him a wealthy man. At the RSA Conference 2022, Newmark, …
-
Emotet malware detections surge 27-fold in first quarter
A new report today from artificial intelligence cybersecurity platform company Deep Instinct Ltd. details a rapid rise in Emotet malware …
-
37 Major Companies and Organizations Pledge to Enhance Cyber Resiliency and Counter Evolving Global Threats
SAN FRANCISCO – Today, in partnership with the Coalition to Reduce Cyber Risk (CR2), 37 companies and organizations have pledged to …
-
New Xage distributed multilayer authentication service protects against ‘MFA bombing’
Zero-trust security startup Xage Security Inc. has introduced a new distributed, multilayer multifactor authentication service designed for …
-
US government warns that Chinese hackers are targeting known vulnerabilities
The U.S. government is warning that Chinese state-sponsored hackers continue to exploit publicly known vulnerabilities to gain access to …
-
New Zscaler report finds ransomware continues to run amok
Ransomware attacks have grown by 80% year-over-year, as they continue to evolve in tactics and scope. The findings come from Zscaler …
-
Offensive Security to offer free streaming series to assist cybersecurity learning
Security training and penetration testing company Offensive Security today announced a new free streaming series to assist cybersecurity …
-
Immuta scoops up $100M for its data-level security technology
Data security startup Immuta Inc. today said it has raised a $100 million late-stage funding round that pegs the company’s valuation at …
-
China-linked threat actors have breached telcos and network service providers
China-linked threat actors have breached telecommunications companies and network service providers to spy on the traffic and steal data. …
-
AA22-158A: People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices
Best Practices • Apply patches as soon as possible • Disable unnecessary ports and protocols • Replace end-of-life infrastructure • …
-
New Swimlane service captures hard-to-reach telemetry and expands actionability
Low-code security automation company Swimlane LLC today announced a new service to capture hard-to-reach telemetry and expand …
●●●