Trends

Get expert insights into the latest developments in cybersecurity to stay ahead of emerging threats and evolving technologies. Our in-depth analysis covers everything from new attack vectors and vulnerabilities to cutting-edge security solutions and trends.

  • SolarMarker Attackers Use SEO Poisoning to Push Malicious Code

    Cybercriminals leveraging the SolarMarker .NET-based backdoor are using a technique called SEO poisoning to drive malicious payloads into victims’ systems so they can gain access to the credentials and data within. According to researchers at Menlo Security, the SolarMarker campaign is one of two such efforts they’ve seen in recent months using SEO poisoning to…


  • Multi-Party Cyberattacks Lead to Big Losses: Security Researchers

    The attacks on SolarWinds and Kaseya over the past year put a spotlight on how an attack on a single company can have downstream consequences on the victim’s partners and customers. The attackers used the entry they gained into the companies to fan out into businesses and government agencies, stealing data and forcing some to…


  • ThycoticCentrify Ransomware Report: 83 Percent of Victims Paying Ransom

    The bulk of companies hit by ransomware are deciding that paying the ransom is the best and fastest way to get their businesses back online, despite growing pressure from the federal government and some in industry to not give into the cybercriminals’ demands. A report this week by researchers at ThycoticCentrify – the result of…


  • After Springhill: Assessing the Impact of Ransomware Lawsuits

    A lawsuit working its way through the courts could have a lot to say about the liabilities facing organizations that have been hit by ransomware attacks – and could have implications for cybersecurity preparation and regulation in general. The first lawsuit over a death allegedly caused by ransomware has been filed in Alabama regarding the…


  • Becoming a Cybercriminal Keeps Getting Easier

    Zero-day vulnerabilities are no longer exclusively for elite hackers. There are now automated scripts available on GitHub so even novice hackers can explore these previously unknown security flaws. That was one of the insights in the HP Wolf Security Threat Insights Report released today. The report noted that the average time for a business to…


  • Preparing for Ransomware: Are Backups Enough?

    In a year where ransomware has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups – but are they enough? Backups are a critical component of any enterprise cybersecurity posture, but they are not an airtight strategy. Like any other digital machine, backup systems are vulnerable to data…


  • Cybersecurity Risks of 5G – And How to Control Them

    5G is on the cusp of widespread adoption. Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to 5G networks doesn’t come without risks. Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout. Beyond…


  • Zero Trust Can’t Protect Everything. Here’s What You Need to Watch.

    Zero trust architecture is an emerging technology in cybersecurity that offers an alternative to the traditional castle-and-moat approach to security. Instead of focusing only on your perimeter to defend against attacks from the outside, zero trust assumes that threats are ubiquitous and pervasive. Therefore, each user, device, and application within your network must verify that…


  • An Investment Firm Built Its Own SIEM. Here’s How.

    SIEM solutions can be expensive and difficult to manage, so one company built its own – and is pleased with the results. At last week’s Black Hat USA, NYC-based financial technology firm Two Sigma Investments took the virtual stage to outline why their existing solution didn’t cut it, the work needed to create an in-house…


  • A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller

    A group of technology luminaries have launched an effort to find and train a new generation of cybersecurity talent, an effort that will gain steam tomorrow with The Cyber Talent CIO Forum. The event is free and open to the public, and that’s central to the group’s goal, which is to find talent in new…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies