Latest Microsoft 365 attacks: connecting the dots
Cybersecurity is always changing, and the most recent round of attacks against Microsoft 365 accounts shows how advanced cyber threats have gotten. These attacks show a concerning trend, ranging from accessing unprotected accounts to using adversary-in-the-middle (AiTM) tactics. Attackers are
Threatlocker is securing supply chains
In this interview, Danny Jenkins, CEO of ThreatLocker, shares his expertise on the evolving landscape of cybersecurity, focusing on the vulnerabilities in supply chains and software systems. He discusses the risks associated with legacy software, strategies for mitigating supply chain
Cyberfraud down from last year’s Cyber Monday and Black Friday
Cyberfraud: Over four per cent of digital transactions globally during the Black Friday weekend and Cyber Monday were fraudulent, according to a recent report by TransUnion. Global intelligence network TransUnion conducted an analysis based on millions of transactions made between
Dutch authorities fine Netflix €4.75 million for mishandling personal data
The Dutch Data Protection Authority (AP) has imposed a 4.75 million euro fine (US$4.95 million) for failing to properly inform customers between the years 2018 and 2020 about what their company does with their personal data. Netflix has appealed against
Corelight transforms Black Hat’s NOC into a real-time lab
In this interview, we delve into Corelight's role in transforming the Black Hat Network Operations Center (NOC) into an interactive "live lab" for cybersecurity professionals. Corelight and its partner organisations were entrusted with running the NOC, building the network, and
Browser fingerprinting : what you need to know
When you browse the internet, your activity might seem anonymous, but sophisticated tracking techniques like browser fingerprinting silently work to identify and follow you behind the scenes. Unlike traditional cookies or trackers, which rely on files stored on your device,
How to build a robust lights-out checklist
A cybercriminal gets paid best by causing enough damage to a victim that justifies payment. After encrypting a few files on a laptop, the likelihood of receiving payment is low. However, encrypting an entire network justifies receiving payment. This is
Holiday phishing traps: how scammers target your festive buying
The holiday season is a time for joy, celebration, and connection. But unfortunately, it's also prime hunting season for scammers, who use the festive mood to bait victims with phishing messages. As shoppers rush to snag deals and communicate with
Hackers demand millionaire ransom for 560GB of Spaniards’ tax data
Spaniards' tax data is under attack. The Spanish Tax Agency defends that it has not been the target of a cyberattack claimed by the hacker group Trinity. Instead, the public body points to an external, private company without connection to