Threats

CISA, Microsoft Warn of Wiper Malware Amid Russia-Ukraine Tensions

The U.S. government agency overseeing cybersecurity is urging the country’s businesses and other organizations to take the necessary steps to protect their networks from any spillover that might occur...

Attacks Escalating Against Linux-Based IoT Devices

Incidents of malware targeting Linux-based Internet of Things (IoT) devices jumped by more than a third in 2021, with three malware families the primary drivers behind the increase. According to a ...

Open Source Sabotage Incident Hits Software Supply Chain

An astonishing incident in recent days highlights the risks of widespread dependence on open source software – while also highlighting the free labor corporations benefit from by using open source sof...

Iran-Based APT35 Group Exploits Log4J Flaw

Security researchers are continuing to see state-supported hacking groups developing tools to leverage the high-profile Log4j vulnerability that exploded onto the scene last month even as the White Ho...

U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions

U.S. federal security agencies are putting companies on alert to potential threats from Russian state-sponsored cybercriminal groups, warning in particular about dangers to critical infrastructure and...

NY AG Investigation Highlights Dangers of Credential Stuffing

A report last week by the New York Attorney General’s Office put a spotlight on the ongoing threat of credential stuffing, a common technique used by cybercriminals that continues to spread and is hel...

Cybersecurity Outlook 2022: Third-Party, Ransomware and AI Attacks Will Get Worse

About the only consensus on cybersecurity in 2022 is that things will get uglier, but in what ways? Third-party security, ransomware, artificial intelligence (AI) and decentralized finance (DeFi) are ...

How to Use MITRE ATT&CK to Understand Attacker Behavior

MITRE ATT&CK ("miter attack") is an up-to-date and widely-used knowledge base that focuses on how attackers think and operate. It’s based on practical use cases, so companies can better evaluate s...

SolarWinds-Like Supply Chain Attacks will Peak in 2022, Apiiro Security Chief Predicts

Cyberthreats against software supply chains moved to the forefront of cybersecurity concerns a year ago when revelations of the attack on software maker SolarWinds emerged. Now one security researc...

The Link Between Ransomware and Cryptocurrency

There are few guarantees in the IT industry, but one certainty is that as the world steps into 2022, ransomware will continue to be a primary cyberthreat. The dangers from ransomware have risen sha...

Latest articles