In a newly seen phishing campaign, malicious actors have exploited URL manipulation techniques to obfuscate their malicious links, compromising businesses and individuals worldwide. Check Point researchers identified a whopping 200,000 phishing emails abusing URL information to hide phishing links, with…
Category: Information Security Buzz
Cutting Through the Noise: Smart Deduplication for Stronger Cybersecurity
2025 promises to be a big year in cybersecurity—for all the wrong reasons. While many are familiar with the projection that cybercrime will cost $10.5 trillion, Forrester’s updated report projects the costs will likely be closer to $12 trillion. To…
Cybersecurity Survey Indicates Organizations Favouring Consolidation and Automation
The second annual Fortra State of Cybersecurity Survey is here. It reveals that organizations are ensuring their foundational and fundamental cybersecurity position is robust to combat more sophisticated threats and comply with more stringent regulations. We also see a rise…
Controlling Shadow AI: Protecting Knowledge Management from Cyber Threats
By 2025, the first major breach of a knowledge management generative artificial intelligence (Gen AI) solution chatbot will make global headlines. This will mark a turning point in cybersecurity for all industries. The widespread adoption of Gen AI-based business solutions…
Baby, You Can Hack My Car: Upstream’s 2025 Automotive and Smart Mobility Cybersecurity Report
Cyberattacks in the automotive industry are on the rise. They’re also becoming more impactful. And the gap between the risk landscape and organizational resilience is growing. Automotive cybersecurity is at a critical moment, and the choice is clear: close the…
Inside a LockBit Ransomware Attack: A Firsthand Account of Financial and Security Fallout
Ransomware attacks are no longer a question of “if” but “when” or even “how often”. In this candid interview, Nigel Sampson, a cybersecurity professional, chatted to Joe Pettit, Director at Bora, to share his experience dealing with a LockBit ransomware…
Darktrace Report Highlights the Growing Power of MaaS, Sneaky Evasion Tactics
Cybercrime-as-a-Service (CaaS) is more than just a trend—it’s here to stay. As sophisticated attack tools become widely (and easily) available, even less experienced cybercriminals can now carry out highly disruptive campaigns. In fact, Malware-as-a-Service (MaaS) now makes up 57% of…
The Bourne Insecurity: When Defense Employees Unwittingly Help Attackers
A recent analysis by cybersecurity firm Hudson Rock on its Infostealers site has uncovered alarming vulnerabilities within the US military and its defense contractors due to widespread info stealer malware infections. According to the company, these infections have compromised sensitive…
How to take your firm from risk to resilience in 8 DORA-compliant steps
There are two types of companies, as the saying goes: those that have been hacked and those that don’t know they’ve been hacked. This is especially true in financial services. According to the IMF’s Global Financial Stability Report, nearly one-fifth…
Mustang Panda APT Exploits Windows Utilities to Slip Through Security Nets
Researchers from Trend Micro’s Threat Hunting team have uncovered a new technique employed by the advanced persistent threat (APT) group dubbed Mustang Panda or Earth Preta. The cyberespionage group has been abusing the Microsoft Application Virtualization Injector (MAVInject.exe) to stealthily…