Because wide area network (WAN) connectivity has been predominantly wired broadband, cellular connectivity has often been relegated to a failover connection option. Now, organizations recognize 5G for its agility in supporting networks because it takes reliable connectivity past fixed sites…
Category: Cybersecurity Insiders
Help Desk Personnel are the Side Door for Cybercriminals
According to Gartner, worldwide end-user spending on security and risk management is projected to total $215 billion in 2024. That is up nearly 15 percent from 2023. This increase in investments is happening for a good reason. Just look at…
Decoding Router Vulnerabilities Exploited by Mirai: Insights from Honeypot Data
Already in 2024, we successfully defended against 5.8 million Mirai-related attacks and saw a spike in honeypot activity related to Mirai, all aimed at exploiting vulnerabilities in aging router systems. These attacks exhibit striking similarities, a theme we will explore…
The Year in GenAI: Security Catches Up with Innovation
Over a year ago, the general public got its first taste of the possibilities of generative artificial intelligence (GenAI) with the public rollout of ChatGPT. As far as watershed tech moments go, it was comparable only to the iPhone launch…
Embracing the benefits of LLM securely
AI is evolving at a rapid pace, and the uptake of Generative AI (GenAI) is revolutionising the way humans interact and leverage this technology. GenAI is based on large language models (LLMs) that have proven remarkable capabilities for breaking down…
How to ensure the security of your SaaS platform
Distributing cloud solutions and services via a proprietary SaaS platform can be a highly profitable business model. Vendors of successful platforms can earn hundreds of millions of dollars annually, following the examples of Datadog, Hubspot, Salesforce, and other SaaS market…
Transforming SOC Operations: How TacitRed Curated Threat Intelligence Boosts Analyst Efficiency and Delivers Tactical Attack Surface Intelligence
By Holger Schulze, Scott Gordon The increasing sophistication, targeting, and volume of cyber threats facing organizations, coupled with attack surface management dynamics, requires cybersecurity solutions to move towards curated findings that help security teams become more efficient in handling the…
Android and iPhone users are vulnerable to Zero Click hacks
The surge in Zero Click exploit, where malicious software infiltrates devices without user consent, has become a concerning trend. To counter this, the National Security Agency (NSA) offers a simple yet effective defense tip at no cost to users. A…
Snowflake cloud customers warned against data theft and extortion attacks
Snowflake, a data-as-a-service firm headquartered in Montana, USA, has recently garnered attention in Google news for unsettling reasons. A threat actor known as UNC5537 claims to have compromised the servers of Snowflake’s AI-driven Data Cloud after obtaining credentials from an…
Exploring the Most Common Types of Cyber Attacks: Understanding the Threat Landscape
In today’s interconnected digital world, cyber attacks have become an ever-present threat, targeting individuals, businesses, and governments alike. Understanding the different types of cyber attacks is crucial for organizations and individuals to effectively mitigate risks and protect themselves against potential…