The security operations center was supposed to address threat detection and response challenge by bringing together people, technology and processes. So, why are many SOCs struggling to deliver? Partha Panda, CEO and co-founder of Cysiv, discusses the challenges facing the modern SOC.
The Emotet botnet, which was hampered by law enforcement actions earlier this year, is making a comeback. The resurgence appears to be due to help from old friends: cybercriminals running the Trickbot botnet. Unfortunatel,y the development may fuel more ransomware attacks.
The U.S. Department of Homeland Security on Monday launched a new personnel system that it says will enable the department to "more effectively recruit, develop, and retain cybersecurity professionals." Those recruited through the system will join the ranks of the DHS Cybersecurity Service, a federal team of cyber...
The U.S. and Israel will expand their diplomatic relationship around cybersecurity, announcing a bilateral task force this week that will support cybersecurity and fintech innovation. The news follows recent action by the U.S. Department of Commerce to blacklist Israeli spyware firm NSO Group.
Google’s Threat Analysis Group has released details of a watering hole campaign targeting a macOS zero-day exploit chain to install a never-before-seen malware on devices of users visiting Hong Kong websites of a media outlet and a prominent pro-democracy labor and political group.
Dutch police have detained Moscow businessman Denis Dubnikov after the U.S. accused him of receiving bitcoins worth $400,000 paid to Ryuk as ransoms by its victims. The U.S. is seeking to extradite the suspect, as the Biden administration's crackdown on ransomware continues.
Including psychology in cybersecurity educational awareness programs allows employees to recognize and trust their own instincts when dealing with a potential security incident, says Denise Beardon, head of information security engagement at international law firm Pinsent Masons.
This webinar helps to understand the evolution of DDoS extortion, its ramifications on 2021 security postures, and the latest best practices to fight back and reduce your risk.
Join Akamai solution engineers Ashwini Naidu, Swagatta Dutta Choudhury, and Felix Addo for an interactive workshop as they take a deep dive and dispel myths about cloud WAF.
Attackers are innovating constantly to try to increase their success rates as they work to evade detection and mitigation technologies in the kill chain. But the future isn’t just more and more attacks.
In this session Akamai will share some of the research and insights into the tools, tactics, and techniques attackers are using to launch their malicious onslaughts while remaining under your defensive radar.
In this webinar, learn more about what has been at the center of virtually every major attack and what cybersecurity teams need to do differently to stop attackers.
Watch this webinar to learn how security teams can detect an adversary who looks and acts like a member of the organization and is moving in operational blind spots.
Join this webinar to hear Steve Hunt, a senior cybersecurity analyst at Aite Group, outline why attackers have been successful, decisions that have created weaknesses, and why common security efforts have been insufficient in preventing attacks using advanced techniques.
The FBI says it has fixed a software misconfiguration that was abused to send fake emails falsely warning of a cyberattack. As many as 100,000 hoax emails were sent in two waves early Saturday morning, originating from a legitimate FBI domain.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.