Generative Data Intelligence

Cyber Security

How Can We Reduce Threats From the IABs Market?

Question: How do we keep initial access brokers from selling access to our networks to any ransomware actors who wants it?Ram Elboim, CEO, Sygnia:...

300k Internet Hosts at Risk for ‘Devastating’ Loop DoS Attack

A newly discovered type of self-perpetuating denial-of-service (DoS) attack targeting application-layer messages has the potential to compromise 300,000 Internet hosts and can be difficult...

Session Takeover Bug in AWS Apache Airflow Reveals Larger Cloud Risk

A vulnerability in Amazon Web Services' (AWS) Managed Workflows for Apache Airflow (MWAA) could have allowed hackers to access users' sessions, perform remote code...

Cyber Warfare: Understanding New Frontiers in Global Conflicts

COMMENTARYIn recent decades, the nature of warfare between nations has evolved substantially with the integration of offensive cyber tactics. In late 2023, Israel's cyber-defense...

Cyber Warfare: Understanding New Frontiers in Global Conflicts

COMMENTARYIn recent decades, the nature of warfare between nations has evolved substantially with the integration of offensive cyber tactics. In late 2023, Israel's cyber-defense...

United Arab Emirates Faces Intensified Cyber-Risk

The United Arab Emirates' focus on becoming a global hub for business and innovation is driving digital transformation in the Middle East, with the...

Using East–West Network Visibility to Detect Threats in Later Stages of MITRE ATT&CK

The Cybersecurity and Infrastructure Security Agency (CISA) calls "insufficient internal network monitoring" one of 10 most common network misconfigurations. Indeed, network analysis and visibility...

Using East–West Network Visibility to Detect Threats in Later Stages of MITRE ATT&CK

The Cybersecurity and Infrastructure Security Agency (CISA) calls "insufficient internal network monitoring" one of 10 most common network misconfigurations. Indeed, network analysis and visibility...

Feds Warn About Vulnerability of US Water Systems

A new White House advisory about threat groups from Iran and China targeting US water and wastewater systems has once again focused attention on...

Rescoms rides waves of AceCryptor spam

Last year ESET published a blogpost about AceCryptor – one of the most popular and prevalent cryptors-as-a-service (CaaS) operating since 2016. For H1 2023...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?