Topic: proactive defense strategies
-
80% of Security Flaws Followed by Spikes in Malicious Activity
New research shows that 80% of sudden spikes in malicious activity (e.g., network scanning) precede the disclosure of security vulnerabilities within six weeks, serving as an early warning system. The study identified strong correlations between activity spikes and vulnerabilities in products fro...
Read More » -
Ransomware Hackers Now Use AI Chatbots to Extort Victims
Cybercriminals are using AI-powered chatbots to automate ransomware negotiations, applying psychological pressure and scaling attacks globally, as seen with the newly identified **GLOBAL GROUP**. The group operates a **ransomware-as-a-service (RaaS) model**, leveraging AI-driven negotiation panel...
Read More » -
Runtime Attacks: How AI Profits Turn Into Costly Black Holes
AI runtime attacks create hidden financial losses, with breaches costing millions in regulated industries and eroding trust in AI investments. Sophisticated threats like prompt injection and data poisoning target live AI operations, requiring a shift to zero-trust frameworks and continuous monito...
Read More » -
UK Ransomware Payments Soar, Victims Lag Behind Global Trends
Ransomware attacks in the UK are more severe than globally, with 70% of affected organizations experiencing data encryption and paying 103% of ransom demands on average. The median UK ransom demand rose to $5.4 million, driven by cybercriminals targeting high-value victims as global ransomware pa...
Read More » -
8 Ransomware Groups Now Using This EDR-Bypassing Tool
A new advanced tool is being used by multiple ransomware groups to bypass endpoint security by exploiting vulnerable drivers and disabling critical defenses before launching attacks. The tool employs heavy obfuscation and BYOVD attacks to target security products from major vendors, allowing rans...
Read More » -
GitHub Abused in Malware-as-a-Service Attack Campaign
Security researchers found a malware campaign using GitHub repositories to distribute threats like SmokeLoader and AsyncRAT via a malware-as-a-service model, linked to the Amadey botnet and Emmenhtal loaders. Attackers shifted from phishing emails to hosting malicious scripts on GitHub, exploitin...
Read More » -
Bitdefender GravityZone EASM Lowers Cyber Threat Risks
Bitdefender launched GravityZone External Attack Surface Management (EASM) to help organizations gain visibility into internet-connected assets and vulnerabilities, addressing complex IT security challenges. The solution proactively scans and analyzes external digital assets without endpoint inst...
Read More » -
Akira Ransomware Exploits CPU Tool to Bypass Microsoft Defender
A ransomware campaign exploits Intel's ThrottleStop driver (rwdrv.sys) to disable Microsoft Defender via BYOVD attacks, deploying a malicious driver (hlpdrv.sys) to manipulate registry settings. The Akira group, active since mid-2025, uses Bumblebee malware delivered through fake installers and S...
Read More » -
Bouygues Telecom data breach affects 6.4 million customers
Bouygues Telecom suffered a data breach affecting 6.4 million customers, exposing personal details like contact information, contract data, and IBANs, though no passwords or payment details were stolen. The company blocked the attackers, notified authorities, and warned customers of potential phi...
Read More » -
CISOs Prepare for Rising Domain Cyber Threats
Cybersecurity leaders predict a surge in sophisticated domain-based attacks, with 70% anticipating heightened risks in 2025 and 98% foreseeing escalating threats over the next three years. AI-powered tools are enabling cybercriminals to refine tactics, such as generating deceptive domains, making...
Read More » -
U.S. Insurance Firms Now Prime Targets for Cyber Hackers
Cybercriminals, particularly the hacking group Scattered Spider, are increasingly targeting U.S. insurance companies, shifting from previous attacks on U.K. retail organizations. Recent breaches at Philadelphia Insurance Companies and Erie Insurance highlight the group's tactics, including social...
Read More »