Data Management
SecurityThreat Actors Are Exploiting Vulnerabilities Faster Than Ever
It only takes five days on average for attackers to exploit a vulnerability, according to a new report.
Cedric Pernet is a senior threat expert with a strong focus on cybercrime and cyberespionage. He currently works at Trend Micro. Prior to that position, he worked for several Computer Emergency Response Teams (CERTs) where he did threat intelligence investigations, incident response, and computer forensics. He was also a Law Enforcement Officer working on Cybercrime in France. He is the author of a paperbook in French language on cyberespionage and an influential person in the cybersecurity community.
EducationNetwork communications
Personal QuoteBruce Schneier - "If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology."
It only takes five days on average for attackers to exploit a vulnerability, according to a new report.
A new report reveals a 2024 surge in mobile, IoT, and OT cyberattacks, highlighting key trends and the need for zero-trust security.
Study reveals alarming risks of AI medical advice from Copilot and highlights the urgent need for professional guidance in healthcare.
Read more about the U.S. Department of Justice and Microsoft’s efforts to interrupt the activities of Russian-based threat actor Star Blizzard, and learn how to protect from this threat.
Read more about a China-linked threat actor that has compromised more than 260 000 devices worldwide to facilitate DDoS and other targeted attacks.
Read more about an attack campaign led by Iran-based cyberespionage threat actor Fox Kitten, and learn how to protect your company from this threat.
Threat actors are abusing Microsoft Sway to host QR Code phishing campaigns.
A new malware called NGate allows cybercriminals to steal near field communication data from Android phones via sophisticated social engineering. The data is relayed to the fraudsters before being used to steal cash.
A new report from cyber threat intelligence company Intel471 reveals that threat actors are infiltrating macOS.
Read more about a China-aligned cyberespionage threat actor dubbed StormBamboo, also known as Evasive Panda, which compromised an Internet Service Provider and infected targets with malware.