AI-powered phishing attacks are on the rise. At the same time, our growing digital footprints provide cybercriminals with almost limitless information they can weaponize.
Join Erich Kron, Security Awareness Advocate at KnowBe4, and Jack Chapman, SVP of Threat Intelligence for Egress, as they discuss how...
Retail cybersecurity teams are increasingly being tasked with streamlining IT operations, reducing costs, and enhancing efficiency across both in-store and online environments. Join us for an insightful webinar to discover how converged endpoint management can help improve incident detection and response speed,...
This past November, Fortinet celebrated 15 years as a publicly traded company and next year will bring another significant milestone, as the company celebrates its 25th anniversary of operations. To honor the occasion, Fortinet COO John Whittle reflects on the significance of these anniversaries and the ongoing...
The Food and Drug Administration is urging blood suppliers - a recent target of attacks - to bolster their cybersecurity practices to prevent and mitigate cyber incidents that could affect the supply and safety of critical blood and blood components used for transfusions and other patient care.
Adversaries are exploiting legitimate processes in endpoint and cloud environments, bypassing detection by leveraging native systems. In the cloud, misconfigured environments and stolen credentials are driving the threat landscape, said Terrance DeJesus, senior security research engineer, Elastic.
Nation-state attackers pose a growing cybersecurity threat driven by specific geopolitical or economic objectives. These actors often target organizations with valuable data, using advanced techniques such as reconnaissance, said Ryan Roobian, global solutions architect, Google Cloud.
Your vulnerability management program may have critical blind spots. Join three industry leaders as they examine whether traditional approaches are still effective against today’s evolving threats, and what needs to change.
Technical Deep-Dive:
Hidden flaws in current vulnerability management approaches;
Why...
If 2024 was the year in which cybercriminals experimented more with AI/ML in the refinement and scale of their attacks, then 2025 must be the year when cyber defenders evolve to better embrace AI in their defenses. These are among the 2025 threat predictions by Fortinet's Derek Manky.
A threat actor with suspected ties to Russian nation-state hackers has listed thousands of IoT devices as proxy networks within minutes of their initial compromise. A campaign that began in 2020 has so far infected 20,000 IoT devices, according to a new report by Trend Micro.
Bitsight's $115 million acquisition of Cybersixgill will merge automated threat intelligence with risk exposure tools. This strategic move reflects the growing demand for streamlined cybersecurity solutions and aligns with Bitsight's mission to enhance cyber-risk management.
In the latest weekly update, ISMG editors explored the growing threat of disrupted ransomware attacks as a public health crisis, the potential global impact of a Donald Trump's second presidential term, and implications of the latest big merger in the cybersecurity market.
Godzilla webshell, a Chinese-language backdoor known for its stealth and ability to execute commands and manipulate files, is publicly available on GitHub, and federal authorities have issued a stern warning to the healthcare sector to prepare for this threat and inevitable cyberattacks.
SoftBank-backed merger between Trustwave and Cybereason brings together leading MDR, EDR, DFIR and threat intelligence capabilities. The combined organization aims to improve AI-driven detection and enhance Microsoft E5 support, targeting enterprise, mid-market, and public sector clients worldwide.
Federal authorities are warning the healthcare sector of an array of cyberthreats - including Scattered Spider hacks, living-off-the-land attacks, and bad actors looking to exploit weaknesses such as F5 misconfigurations and also so-called "Miracle Exploit" flaws in some Oracle software.
Industrial control systems (ICS) play a vital role in critical infrastructure, yet new research from Bitsight's TRACE team has exposed multiple critical vulnerabilities in Automated Tank Gauge (ATG) systems. Join experts Jake Olcott, VP of Government Affairs, and Pedro Umbelino, Principal Research Scientist, as they...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.