Topic: cyber defense

  • Stop Hackers Exploiting LOTL Attacks

    Stop Hackers Exploiting LOTL Attacks

    Attackers increasingly use "Living off the Land" (LOTL) techniques, leveraging legitimate system tools like PowerShell to blend malicious activities with normal operations, making detection difficult. Bitdefender's PHASR technology counters LOTL by learning individual user and endpoint behaviors ...

    Read More »
  • Span Cyber Security Arena 2026: New Visions for Cybersecurity

    Span Cyber Security Arena 2026: New Visions for Cybersecurity

    The Span Cyber Security Arena 2026 conference in Poreč (May 20-22) will offer a comprehensive forum for professionals to explore the latest strategies and tools for defending against modern digital threats. The event features keynote speakers and expert-led masterclasses, providing high-level ins...

    Read More »
  • Living in a World of Constant Threat Assessment

    Living in a World of Constant Threat Assessment

    Insurance companies are adopting persistent threat evaluation, AI automation, and rigorous third-party risk management to enhance cybersecurity readiness and defend against sophisticated attacks. Daily threat assessments prioritize trustworthy intelligence, operational impact, and multi-source ve...

    Read More »
  • Google Issues Emergency Chrome Update for 2 Billion Users

    Google Issues Emergency Chrome Update for 2 Billion Users

    Google has issued an emergency security patch for Chrome to address a high-severity vulnerability (CVE-2025-13223) that is already being actively exploited, allowing attackers to execute arbitrary code. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this flaw to its Kn...

    Read More »
  • Cybermindz Launches Global Council to Boost Cyber Resilience

    Cybermindz Launches Global Council to Boost Cyber Resilience

    Cybermindz has launched a Global CISO Advisory Council on World Mental Health Day to address stress and burnout among cybersecurity professionals, integrating mental resilience into security strategy. Research shows cybersecurity personnel experience burnout at higher rates than frontline healthc...

    Read More »
  • XWorm Malware Returns with Ransomware & 35+ Plugins

    XWorm Malware Returns with Ransomware & 35+ Plugins

    XWorm malware has evolved with ransomware capabilities and over 35 plugins, distributed by multiple threat actors through phishing campaigns after the original developer's departure. Initially a versatile remote access trojan, it steals sensitive data, enables DDoS attacks, and has been widely ad...

    Read More »
  • Google: AI-Powered Malware Is Now in Active Use

    Google: AI-Powered Malware Is Now in Active Use

    Google has identified new AI-driven malware families like PromptFlux and PromptSteal that use large language models to dynamically generate malicious scripts, enabling them to evade detection and operate more flexibly. These malware variants employ AI for various malicious purposes, including sel...

    Read More »
  • Uncover Malicious OAuth Apps in Microsoft 365 with Cazadora

    Uncover Malicious OAuth Apps in Microsoft 365 with Cazadora

    Auditing OAuth applications in Microsoft 365 is critical due to the high risk of malicious apps, which can severely compromise security. Use an open-source script to identify suspicious apps by checking for indicators like mimicry of user names, generic names, or anomalous reply URLs. Huntress re...

    Read More »
  • Pure Storage Boosts Cyber Resilience with New Innovations & Partnerships

    Pure Storage Boosts Cyber Resilience with New Innovations & Partnerships

    Pure Storage is enhancing cybersecurity by embedding native threat detection into its storage platform and forming strategic partnerships to proactively identify threats and enable faster recovery. The company is integrating with security leaders like CrowdStrike and Superna to provide real-time ...

    Read More »
  • SANS 2025 SOC Survey: Critical Gaps & Top Team Strategies

    A SANS Institute report highlights a major gap in SOCs, with 42% lacking a strategy to manage the daily influx of threat data despite heavy reliance on endpoint alerts. The survey reveals that 85% of SOC analysts use endpoint security alerts as their primary trigger for incident response, yet man...

    Read More »
  • Ex-L3Harris Cyber Chief Pleads Guilty in Russian Trade Secrets Plot

    Ex-L3Harris Cyber Chief Pleads Guilty in Russian Trade Secrets Plot

    Peter Williams, a former cybersecurity director at L3Harris Trenchant, pleaded guilty to selling classified trade secrets valued at over $1 million to a Russian entity. He faces a potential prison sentence of 87 to 108 months, financial penalties up to $300,000, and $1.3 million in restitution, w...

    Read More »