Thursday, November 21, 2024
Cybersecurity News
Industry News
Webinars
Topics
About
Sponsor
Cybersecurity News
Industry News
Webinars
Topics
About
Sponsor
Combing the world for the cybersecurity stories you need to know.
Cybersecurity News
Rethinking API Security: Generative AI, Bots, and the Need for New Defenses
November 20, 2024
API vulnerabilities–and their potential impact on a company’s cybersecurity defenses–are a real and growing concern. Traceable recently released its second annual research report, the 2025 Global State of API Security, and found that most organizations…
Read More >
The Remcos RAT Trap: How Phishing Campaigns Are Exploiting Old Vulnerabilities for Remote Control
November 19, 2024
The manipulation of remote administration tools (RATs) for cyberattacks is on the rise, with bad actors evading security measures to exploit known vulnerabilities. The dangers here are many, as leveraging RATs grants attackers high levels…
Read More >
RaaS Revolution: How Ransomware-as-a-Service is Escalating the Corporate Cybersecurity Arms Race
November 18, 2024
Ransomware has evolved from isolated, opportunistic attacks into a sprawling, professionalized industry. Today, cybercriminals have access to Ransomware-as-a-Service (RaaS) platforms that provide powerful tools and infrastructure, making it possible for even novice attackers to launch…
Read More >
Microsoft Report Finds Human-Operated Attacks and Unmanaged Devices Are Leading to More Cyberattacks
November 14, 2024
The newly released Microsoft Digital Defense Report 2024 provides in-depth analysis and insights into the latest trends in cybersecurity. This report is crucial for any organization looking to stay informed about the latest threats and…
Read More >
Tricked By a CAPTCHA: How Cybercriminals are Using Fake Verifications to Steal Sensitive Data
November 12, 2024
One of the most ubiquitous security measures on the internet, CAPTCHA is not generally seen as a potential threat vector, but bad actors can leverage fake CAPTCHA pages to harvest sensitive information from their targets.…
Read More >
Latrodectus Malware: The Stealth Phishing Threat to Critical Sectors
November 11, 2024
Latrodectus is a relatively new and sophisticated type of malware. Its name comes from the Latrodectus genus of spiders, which includes the infamous black widow. Latrodectus is well-named since it reflects the malware’s stealthy and…
Read More >
The Overconfidence Trap: How Skipped Cybersecurity Training is Leaving Businesses Exposed
November 08, 2024
Cybersecurity training access has increased for the first time in four years, yet a quarter of employees still skip it entirely—often due to overconfidence, according to a new global study. The findings come from CybSafe's…
Read More >
Data Breaches Are More Costly Than We Thought—And Companies May Be Ill-Prepared
November 07, 2024
How much do data breaches really cost organizations? Are companies truly prepared to absorb the full extent of the costs associated with a data breach? New research from ExtraHop argues companies are not. The true…
Read More >
Cybercriminals Shave Exploitation Times to Record Lows: Can Organizations Keep Pace?
November 06, 2024
The amount of time it takes for a vulnerability to be exploited after discovery, or time-to-exploit (TTE), is on the decline as cybercriminals are always honing their techniques and adapting their attacks for optimal efficiency…
Read More >
IoT in the Crosshairs: Securing the New Digital Frontier
November 05, 2024
The number of cyberattacks targeting Internet of Things (IoT) devices is increasing and presents a growing concern for companies in virtually every industry today. According to new research from Zscaler, from May 2023 to June…
Read More >
71% of Hackers Say AI Boosts Hacking Efficiency but Introduces New Risks
November 04, 2024
Artificial intelligence (AI) has been a hot topic in recent years, as rapidly evolving technological capabilities have been increasingly adopted for both business and personal use. This trend has included the use of AI for…
Read More >
ConfusedPilot Attack: The Alarming New Threat to AI Systems Like Microsoft Copilot
October 31, 2024
A novel attack method is making AI systems vulnerable to manipulation and misinformation, with significant implications for businesses relying on AI-driven tools. A newly discovered attack on AI systems lets anyone with access to add…
Read More >
Cyber Resilience in Compliance: Transforming a Costly Requirement into a Competitive Edge
October 30, 2024
With compliance demands mounting, businesses are discovering that regulatory mandates can drive more than just red tape. Understanding and following all of the applicable laws and regulations can be daunting enough on its own, and…
Read More >
Critical Cyber Skills Shortage Exposes Businesses to New Threats: How AI and Upskilling Are the Frontline Defense
October 25, 2024
The cybersecurity landscape is evolving at breakneck speed, but there's a problem: the talent pool isn't keeping up. According to the 2023 ISC2 Cybersecurity Workforce Study, despite a global cybersecurity workforce of 5.5 million professionals,…
Read More >
Slack Breach Highlights Growing Cyber Risks in Remote Collaboration Tools
October 24, 2024
The hits keep on coming. Just this summer, the hacking group NullBulge breached Disney’s Slack system and stole over a terabyte of data, including employees’ messages, spreadsheets, and PDFs. After the breach, the hackers published…
Read More >
AI is Supercharging Phishing: Why Traditional Defenses Can’t Keep Up
October 23, 2024
Cybersecurity experts are sounding the alarm: AI-driven phishing attacks are bypassing traditional defenses and duping even the most vigilant employees. A recent study reveals that over 60% of users fall victim to AI-generated phishing emails,…
Read More >
Are Your Cybersecurity Budgets Misaligned? A New Approach to Spending Smarter
October 17, 2024
As technology and cybersecurity continue to evolve, it is important for organizations to adapt their budgets over time. What may have been cutting-edge protection five years ago can be ineffective, inefficient, or downright obsolete today.…
Read More >
From Phishing to Deepfakes: The New Face of Social Engineering
October 16, 2024
For decades, phishing attacks have been the bread and butter of cybercrime. Most of us have encountered the familiar signs—an email with a suspicious link or a message from a “bank” urgently asking for your…
Read More >
Subscribe for the Latest News
"
*
" indicates required fields
First Name
*
Last Name
*
Company Name
*
Job Title
*
Email
*
Country
*
Country *
United States
Afghanistan
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius and Saba
Bosnia and Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cabo Verde
Cambodia
Cameroon
Canada
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos Islands
Colombia
Comoros
Congo
Congo, Democratic Republic of the
Cook Islands
Costa Rica
Croatia
Cuba
Curaçao
Cyprus
Czechia
Côte d'Ivoire
Denmark
Djibouti
Dominica
Dominican Republic
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard Island and McDonald Islands
Holy See
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iran
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Japan
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Democratic People's Republic of
Korea, Republic of
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libya
Liechtenstein
Lithuania
Luxembourg
Macao
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia
Moldova
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Norway
Oman
Pakistan
Palau
Palestine, State of
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Romania
Russian Federation
Rwanda
Réunion
Saint Barthélemy
Saint Helena, Ascension and Tristan da Cunha
Saint Kitts and Nevis
Saint Lucia
Saint Martin
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Singapore
Sint Maarten
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Spain
Sri Lanka
Sudan
Suriname
Svalbard and Jan Mayen
Sweden
Switzerland
Syria Arab Republic
Taiwan
Tajikistan
Tanzania, the United Republic of
Thailand
Timor-Leste
Togo
Tokelau
Tonga
Trinidad and Tobago
Tunisia
Turkmenistan
Turks and Caicos Islands
Tuvalu
Türkiye
US Minor Outlying Islands
Uganda
Ukraine
United Arab Emirates
United Kingdom
Uruguay
Uzbekistan
Vanuatu
Venezuela
Viet Nam
Virgin Islands, British
Virgin Islands, U.S.
Wallis and Futuna
Western Sahara
Yemen
Zambia
Zimbabwe
Åland Islands
Employee Count
*
Employee Count *
< 100 employees
100 to 249 employees
250 to 499 employees
500 to 999 employees
1,000 to 2,499 employees
2,500 to 4,999 employees
5,000 to 9,999 employees
10,000 to 24,999 employees
25,000+ employees
Industry
*
Industry *
Advertising & Marketing
Agriculture
Airlines & Aerospace (including Defense)
Automotive
Business Support & Logistics
Construction, Machinery and Homes
Education
Entertainment & Leisure
Finance & Financial Services
Food & Beverages
Government
Health Care & Pharmaceuticals
Insurance
Manufacturing
Nonprofit
Real Estate
Retail & Consumer Durables
Telecommunications, Technology, Internet & Electronics
Utilities, Energy, and Extraction
Other
Consent
*
I have read and agree to the Security Buzz
Privacy Policy
and understand that I may receive communications from Security Buzz and its partners by submitting this form.
*
Phone
This field is for validation purposes and should be left unchanged.
Webinars
Thursday, Dec. 5
2pm ET / 11am PT
Why the legacy approach to application security is failing
Thursday, Jan. 23
1pm ET / 10am PT
Bridge the Cybersecurity Skills Gap with Managed Security Services