Tag - Threat

Guarding Against QR Code Phishing: New Cybersecurity Threat

Originally published by Abnormal Security. Bad actors have been using phishing emails to steal sensitive data for three decades. Impersonating a trusted individual or brand and manufacturing a sense of urgency, attackers deceive targets into providing private information like login credentials or bank account details. Because email wasn’t initially designed with...

New Threat: Discovery of the Log4j XMRig Malware

Originally published by Uptycs. Written by Shilpesh Trivedi and Nisarga C M. The Uptycs Threat Research Team has uncovered a large-scale, ongoing operation within the Log4j campaign. Initially detected within our honeypot collection, upon discovery, the team promptly initiated an in-depth analysis to delve into the complexities of this dynamic campaign. The threat...

NASA to Discuss Outcome of 5th Biennial Asteroid Threat Exercise

NASA will host a virtual media briefing at 3:30 p.m. EDT, Thursday, June 20, to discuss a new summary of a recent tabletop exercise to simulate national and international responses to a hypothetical asteroid impact threat. The fifth biennial Planetary Defense Interagency Tabletop Exercise was held April 2 and 3, 2024, at the Johns Hopkins Applied Physics Laboratory...

Harnessing Threat Intelligence for Proactive Security

Originally published by CXO REvolutionaries. Written by Ben Corll, CISO in Residence, Zscaler. Let’s face it, our jobs as CISOs are a constant dance with the shadows. We fight invisible enemies, anticipate the next attack, and strive to stay one step ahead of ever-evolving threats. That’s where threat intelligence comes in – it’s the intel that...

The impoundment threat, explained

Trump’s claim that the president has unrestrained constitutional power to withhold funds is wrong Donald Trump is promising to assert sweeping constitutional power to cancel federal funds for an array of agencies and programs if he’s reelected president.  On June 7, 2024, The Washington Post reported that Trump allies are considering cutting funds enacted into law...

The Power of Continuous Threat Exposure Management

Written by Alex Vakulov. The growing dynamics of cyber risks are forcing companies to shift their approach to information security from reactive to proactive. Gartner has introduced a new concept called Continuous Threat Exposure Management (CTEM) to address this. In 2022, Gartner first introduced CTEM, highlighting that it is not a specific product or solution but...