Topic: proactive defense strategies

  • 80% of Security Flaws Followed by Spikes in Malicious Activity

    80% of Security Flaws Followed by Spikes in Malicious Activity

    New research shows that 80% of sudden spikes in malicious activity (e.g., network scanning) precede the disclosure of security vulnerabilities within six weeks, serving as an early warning system. The study identified strong correlations between activity spikes and vulnerabilities in products fro...

    Read More »
  • Ransomware Hackers Now Use AI Chatbots to Extort Victims

    Ransomware Hackers Now Use AI Chatbots to Extort Victims

    Cybercriminals are using AI-powered chatbots to automate ransomware negotiations, applying psychological pressure and scaling attacks globally, as seen with the newly identified **GLOBAL GROUP**. The group operates a **ransomware-as-a-service (RaaS) model**, leveraging AI-driven negotiation panel...

    Read More »
  • Runtime Attacks: How AI Profits Turn Into Costly Black Holes

    Runtime Attacks: How AI Profits Turn Into Costly Black Holes

    AI runtime attacks create hidden financial losses, with breaches costing millions in regulated industries and eroding trust in AI investments. Sophisticated threats like prompt injection and data poisoning target live AI operations, requiring a shift to zero-trust frameworks and continuous monito...

    Read More »
  • UK Ransomware Payments Soar, Victims Lag Behind Global Trends

    UK Ransomware Payments Soar, Victims Lag Behind Global Trends

    Ransomware attacks in the UK are more severe than globally, with 70% of affected organizations experiencing data encryption and paying 103% of ransom demands on average. The median UK ransom demand rose to $5.4 million, driven by cybercriminals targeting high-value victims as global ransomware pa...

    Read More »
  • 8 Ransomware Groups Now Using This EDR-Bypassing Tool

    8 Ransomware Groups Now Using This EDR-Bypassing Tool

    A new advanced tool is being used by multiple ransomware groups to bypass endpoint security by exploiting vulnerable drivers and disabling critical defenses before launching attacks. The tool employs heavy obfuscation and BYOVD attacks to target security products from major vendors, allowing rans...

    Read More »
  • GitHub Abused in Malware-as-a-Service Attack Campaign

    GitHub Abused in Malware-as-a-Service Attack Campaign

    Security researchers found a malware campaign using GitHub repositories to distribute threats like SmokeLoader and AsyncRAT via a malware-as-a-service model, linked to the Amadey botnet and Emmenhtal loaders. Attackers shifted from phishing emails to hosting malicious scripts on GitHub, exploitin...

    Read More »
  • Bitdefender GravityZone EASM Lowers Cyber Threat Risks

    Bitdefender GravityZone EASM Lowers Cyber Threat Risks

    Bitdefender launched GravityZone External Attack Surface Management (EASM) to help organizations gain visibility into internet-connected assets and vulnerabilities, addressing complex IT security challenges. The solution proactively scans and analyzes external digital assets without endpoint inst...

    Read More »
  • Akira Ransomware Exploits CPU Tool to Bypass Microsoft Defender

    Akira Ransomware Exploits CPU Tool to Bypass Microsoft Defender

    A ransomware campaign exploits Intel's ThrottleStop driver (rwdrv.sys) to disable Microsoft Defender via BYOVD attacks, deploying a malicious driver (hlpdrv.sys) to manipulate registry settings. The Akira group, active since mid-2025, uses Bumblebee malware delivered through fake installers and S...

    Read More »
  • Bouygues Telecom data breach affects 6.4 million customers

    Bouygues Telecom data breach affects 6.4 million customers

    Bouygues Telecom suffered a data breach affecting 6.4 million customers, exposing personal details like contact information, contract data, and IBANs, though no passwords or payment details were stolen. The company blocked the attackers, notified authorities, and warned customers of potential phi...

    Read More »
  • CISOs Prepare for Rising Domain Cyber Threats

    CISOs Prepare for Rising Domain Cyber Threats

    Cybersecurity leaders predict a surge in sophisticated domain-based attacks, with 70% anticipating heightened risks in 2025 and 98% foreseeing escalating threats over the next three years. AI-powered tools are enabling cybercriminals to refine tactics, such as generating deceptive domains, making...

    Read More »
  • U.S. Insurance Firms Now Prime Targets for Cyber Hackers

    U.S. Insurance Firms Now Prime Targets for Cyber Hackers

    Cybercriminals, particularly the hacking group Scattered Spider, are increasingly targeting U.S. insurance companies, shifting from previous attacks on U.K. retail organizations. Recent breaches at Philadelphia Insurance Companies and Erie Insurance highlight the group's tactics, including social...

    Read More »
Close

Adblock Detected

We noticed you're using an ad blocker. To continue enjoying our content and support our work, please consider disabling your ad blocker for this site. Ads help keep our content free and accessible. Thank you for your understanding!