Threat

The Threat That Can’t Be Ignored: CVE-2023-46604 in Apache ActiveMQ

[By Mike Walters, President and co-founder of Action1] In 2023, we witnessed numerous security vulnerabilities making headlines, with a few recent examples being CitrixBleed and libwebp. However, there is another vulnerability that demands immediate attention, despite not receiving the level of recognition it truly deserves in the media.   Apache ActiveMQ vulnerability, known as CVE-2023-46604, […]

The Latest Threat CISOs Cannot Afford to Ignore—Business Payment Fraud

[By Shai Gabay, CEO, Trustmi] As if the list of things keeping CISOs up at night wasn’t long enough, cyberattacks on finance teams and business payment processes are now a priority because they are in the bullseye of bad actors. According to a 2023 webcast poll from Deloitte Center for Controllership™, more than 48 percent […]

The Threat of Data Scraping for Marketing to Cybersecurity

In the digital age, data is often referred to as the “new oil.” Its importance cannot be overstated, especially in the realm of marketing. Marketers are constantly seeking ways to gather data to gain insights into customer behavior, preferences, and trends. One of these methods is data scraping, which, when used unethically or without proper […]

Email inboxes are vulnerable to sophistication driven cyber attacks

In today’s digital world of communication, a vast amount of information is stored and processed through email communication. This includes sensitive data related to financial transactions, healthcare, professional endeavors, and personal conversations with loved ones. Consider this scenario: a malicious hacker gains access to email credentials through phishing techniques and subsequently takes control of the […]

Deepfake: Unveiling the Emerging Cybersecurity Threat

With the rapid advancement of artificial intelligence (AI) technology, a new and concerning cybersecurity threat has emerged: deepfakes. Deepfakes are highly realistic manipulated videos or audio recordings that can convincingly depict individuals saying or doing things they never actually did. This innovative technology poses significant challenges in preserving trust, compromising privacy, and enabling various forms […]

USB Pen Drives posing as a great cyber threat to IT Infrastructure

USB Pen Drives also called as Removable pen drives are posing as a great cyber threat to IT Infrastructure says research carried out by IBM X-Force and another research carried out by Honeywell Cybersecurity claims that 52% of cyber attacks are targeted at the removable media. In both cases, removable media or USB drives is […]

THREAT HUNTING: IS YOUR SECURITY OPERATION READY TO LAUNCH SUCH A PROGRAM?

This post was originally published by (ISC)² Management. It could be a blended attack as slick as a multichannel marketing campaign. Or a spontaneous crime of opportunity by a single dis-gruntled employee. It could even be an innocent configuration error. When a threat exists, there will be indicators. The perennial challenge is to hunt for […]

Major Mobile Security Threats of 2019

As businesses are going mobile, data security seems to be a top precedence for most enterprise leaders in 2019. And that’s because securing information at every level has become a priority than just a necessity. So, Cybersecurity Insiders has outlined a list of major Mobile Security Threats of 2019 which might hinder the growth of […]

Ransomware attack on US 2020 election data

US officials along with some dignitaries from the white house are worried that the voter registration database and polled results data of upcoming 2020 elections will be vulnerable to cyber threats such as a ransomware attack. According to a report of Reuters, Homeland Security’s Cybersecurity Infrastructure Security Agency (CISA) has reacted to the issue early […]

Top 15 Cyber Threats for 2019

CYFIRMA, a cybersecurity intelligence division of Antuit Group has come up with the list of cyber threat predictions for 2019. The firm adds in its predictive analysis that hackers will see to capitalize on GDPR, invade more cloud platforms for vulnerabilities and expand the use of multi-homed malware attacks in the coming year. The Texas-based […]

Share this page