Skip to content

The Secret Vulnerability Finance Execs are Missing

a call-to-action. The financial services industry is one of the most targeted sectors when it comes to cyberattacks and breaches. The potential losses from cyberattacks could reach a few hundred billion dollars a year, eroding bank profits and potentially threatening financial stability. However, the risk goes beyond sophisticated APTs and cybercriminal operations. A vulnerability that… 

Uncovering the Unknown: TA866, a Financially Motivated Threat Actor Targeting Companies with Bespoke Malware

A previously unknown threat actor, dubbed TA866, has been targeting companies in the U.S. and Germany with bespoke malware designed to steal confidential information. Enterprise security company Proofpoint, which is tracking the activity cluster under the name Screentime, said the group is likely financially motivated. The campaigns have been ongoing since October 3, 2022 and… 

Reinforcing Endpoint Security after the ESXiArgs Ransomware Outbreak: What You Need to Know

Feb 11, 2023 is a date that is sure to be remembered in the world of cybersecurity. On this day, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a decryptor for affected victims to recover from ESXiArgs ransomware attacks. Little did they know that the threat actors would bounce back with an updated version… 

Unraveling the Challenges of Deception Technology in Industrial Control Systems Security: A Dive into Orange Cyberdefense’s Security Navigator

In conclusion, the Security Navigator 2023 report of Orange Cyberdefense has demonstrated a rapid increase of attacks on industrial control systems (ICS) in recent years, and it is therefore vitally important to ensure cybersecurity for operational technology (OT). Deception is an effective option to improve threat detection and response capabilities, and there are some ICS… 

Impacts of Ransomware Attacks on Storage & Backup Security: A CISO Point of View

One thing is clear: the “business value” of data continues to grow, making it an organization’s primary piece of intellectual property. From a cyber risk perspective, attacks on data are the most prominent threat to organizations. Regulators, cyber insurance firms, and auditors are paying much closer attention to the integrity, resilience, and recoverability of organization… 

Aligning DevOps and SecOps: How Automated Pen Testing Can Improve Security and Agility

Feb 15, 2023 marks an important day for organizations that want to run a secure and efficient web application security posture. Security and development teams often butt heads with each other, leading to tension and disruption of the development process. One way to resolve this conflict is to automate security testing with every release, a…