Nebraska Issues First Federal Cyber-stalking Sentence

Nebraska Issues First Federal Cyber-stalking Sentence The first ever person to be convicted of cyber-stalking in the District of Nebraska has been sentenced to federal prison. Dennis Sryniawski, a 48-year-old…

What Is Extended Detection and Response (XDR)? Features, Benefits, and Beyond

Overloaded security teams, poor visibility, and threat alert overload have quite an impact when it comes to detecting and effectively responding to cyber threats. Since today’s cyberattacks are extremely tricky…

YouTube Used to Push Password-Stealing Malware

A Trojan is a type of malware that acts according to the Greek legend, as it camouflages itself as a legitimate file or program to trick unsuspecting users into installing…

DOJ Sues Robocaller to Pay Massive Fine

DOJ Sues Robocaller to Pay Massive Fine The United States' Department of Justice (DOJ) is seeking to recover a financial penalty of nearly $10m that was imposed on a man…

Introducing ATT&CK v10: More Objects, Parity and Features

Amy L. RobertsonOct 21 · 6 min read By Amy L. Robertson (MITRE), Alexia Crumpton (MITRE), and Chris Ante (MITRE) As announced a couple of weeks ago, we’re back with…

Microsoft announces security programs for nonprofits as nation-state attacks increase

Microsoft unveiled a new suite of tools on Thursday built to protect nonprofits as threats against philanthropic organizations globally have skyrocketed, particularly from nation-states. The Microsoft Security Program for Nonprofits…

#ISC2Congress: How to Mitigate Evolving Insider Threats

#ISC2Congress: How to Mitigate Evolving Insider Threats The changing nature of insider threats was described by Lisa Forte, founder, Red Goat Cyber Security, during a keynote presentation at this week’s virtual ISC2…

Distributed Denial of Service Attacks Against Russia Have Tripled

Distributed Denial of Service, otherwise known as DDoS attacks are online attacks in which legitimate users are prevented from accessing their target online location. The attack happens by flooding the…

Windows Defender Is an Underutilized Endpoint Security Resource

Microsoft Defender Antivirus suffers from a perception problem. For the first decade of its existence, starting with its 2006 release, Defender was a much-maligned piece of software that no business…

Palo Alto warns of BEC-as-a-service, finds average wire fraud attempted is $567,000 with peak of $6 million

Business email compromise (BEC) continues to cost victims thousands — and sometimes millions — of dollars, according to a new report from Palo Alto Networks’ threat research group Unit 42.…