brandpostSponsored by CyberArkWhy identity security Is essential to cybersecurity strategyIdentity security as the foundation of cyber resilience, ensuring organizations are well-equipped to protect against cyber threats.By Claudio Neiva, CyberArk’s Field Technology Director (LATAM), PAM and Identity Security24 Jun 20246 minsCybercrime brandpostSponsored by CyberArk Understanding APIs and how attackers abuse them to steal dataBy John Walsh, senior product marketing manager at CyberArk24 Jun 20245 minsCybercrimefeature Deepfakes: Coming soon to a company near youBy Grant Gross14 Jun 20248 minsPhishingCybercrime newsMicrosoft: The brand attackers love to imitateBy Martin Bayer 03 Jun 20243 minsPhishingEmail SecurityCybercrime news‘Operation Endgame’ deals major blow to malware distribution botnetsBy Lucian Constantin 30 May 20244 minsBotnetsMalwareCybercrime newsWorld’s largest botnet seized in Federal bust, Chinese national arrestedBy Shweta Sharma 30 May 20244 minsBotnetsCybercrime newsKroll cyber threat landscape report: AI assists attackers By Lynn Greiner 24 May 20244 minsThreat and Vulnerability ManagementCybercrimeVulnerabilities news analysisEmerging ransomware groups on the rise: Who they are, how they operateBy Lucian Constantin 24 May 20246 minsRansomwareCybercrime newsTracking manual attacks may deliver zero-day previewsBy Evan Schuman 23 May 20244 minsCyberattacksFraudCybercrime ArticlesnewsLockBit no longer world’s No. 1 ransomware gangAfter dominating for eight months, LockBit has been overtaken by ransomware gang Play in the wake of a law enforcement crackdown and unmasking of LockBit’s alleged creator.By Viktor Eriksson 23 May 2024 2 minsRansomwareCybercrimenews analysisGlobal stability issues alter cyber threat landscape, ESET reportsWith conflict on the rise, regional APT groups are increasing activity, altering focus, and putting specific industries in their crosshairs. Here’s what CISOs should know.By Evan Schuman 20 May 2024 4 minsAdvanced Persistent ThreatsCyberattacksThreat and Vulnerability ManagementnewsBreachForums seized by law enforcement, admin Baphomet arrested Official telegram channels operated by BreachForums members confirm law enforcement seizures and arrest. By Shweta Sharma 16 May 2024 4 minsData BreachCybercrimenewsAdministrator of ransomware operation LockBit named, charged, has assets frozenA Russian national alleged to have been the administrator of the notorious and prolific LockBit ransomware provider faces international charges. A $10-million reward for the suspect’s arrest has been offered.By Lucian Constantin 07 May 2024 3 minsAdvanced Persistent ThreatsHacker GroupsRansomwareopinionWhat is the dark web? How to access it and what you’ll findThe dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.By Darren Guccione 02 Apr 2024 13 minsData BreachTechnology IndustryCybercrimenewsThe US indicts 7 Chinese nationals for cyber espionageThe UK has similarly linked a Chinese state-affiliated entity to the compromise of the UK Electoral Commission’s systems between 2021 and 2022.By Sandeep Budki 26 Mar 2024 6 minsCyberattacksCybercrimenews analysisNew phishing campaign targets US organizations with NetSupport RATThe sophisticated campaign gives attackers wide access under the guise of legitimate remote support software.By Lucian Constantin 21 Mar 2024 3 minsPhishingCyberattacksMalwarenews analysisNo easy solutions to the ransomware threat despite takedownsLaw enforcement takedowns of ransomware actors are accelerating, but experts think that as long as Russia harbors the cybercriminals, there are no quick and easy solutions to tamping down the ransomware crime wave.By Cynthia Brumfield 19 Mar 2024 11 minsRansomwareCybercrimenews analysisAttackers abuse cloud accounts to spawn thousands of crypto CDN nodesThis new technique to monetize cryptojacking avoids traditional detection methods that rely on monitoring CPU cycles and RAM usage.By Lucian Constantin 13 Mar 2024 4 minsCryptocurrencyCyberattacksCloud Securitynews analysisBianLian group exploits TeamCity again, deploys PowerShell backdoorThe extortion group has rewritten its Go-based backdoor to use TeamCity as an initial access vector.By Lucian Constantin 11 Mar 2024 4 minsRansomwareMalwareCybercrimenews analysisAttack targets Docker, Hadoop, Confluence, and Redis with new payloadsThe attack targets publicly accessible deployments and exploits misconfigurations and known vulnerabilities to plant cryptominers.By Lucian Constantin 06 Mar 2024 6 minsCryptocurrencyCyberattacksMalwarenews analysisNew Redis attack campaign weakens systems before deploying cryptominerAttackers behind the Migo malware target exposed Redis servers and change key configuration settings to install the cryptominer and gain persistence.By Lucian Constantin 20 Feb 2024 6 minsCryptocurrencyCyberattacksMalware Show more Show less View all Resources whitepaper The IT Leader’s Guide to Partnerships That Deliver on Employee Experience Transformation Employee experience (EX) reimagines how people, data, and technology work together to constantly adapt, evolve, and grow the organization equitably into the best version of itself. The post The IT Leader’s Guide to Partnerships That Deliver on Employee Experience Transformation appeared first on Whitepaper Repository –. By Workday Inc. 24 Jun 2024Business OperationsEmployee ExperienceHuman Resources whitepaper How intelligent business systems help retailers drive profitability and growth By Workday Inc. 24 Jun 2024Business OperationsERP SystemsRetail Industry whitepaper SMBs at the leading edge: 4 key considerations for growth and success By Workday Inc. 24 Jun 2024Business OperationsFinance and Accounting SystemsSmall and Medium Business View all Video on demand videoAn inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another. 08 Aug 2018 10 minsPhishingEmail ClientsCybercrime What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 07 Aug 2018 15 minsPhishingEmail ClientsCybercrime An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40 06 Aug 2018 7 minsPhishingEmail ClientsCybercrime Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37 30 Jul 2018 PhishingEmail ClientsCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Did hackers steal 33TB of data from the Federal Reserve? By Shweta Sharma 25 Jun 20244 mins Data BreachHacker Groups feature 6 ways the CISO role is evolving today By Esther Shein 25 Jun 202412 mins CSO and CISOCareersIT Leadership news US investigates China Mobile, China Telecom, and China Unicom over data misuse concerns By Prasanth Aby Thomas 25 Jun 20241 min Data PrivacyTelecommunications Industry podcast CSO Executive Sessions India with Hilal Lone, CISO, Razorpay 11 Jun 202429 mins CSO and CISO podcast CSO Executive Sessions: The new realities of the CISO role – whistleblowing and legal liabilities 28 May 202417 mins CSO and CISO podcast CSO Executive Sessions India with Pradipta Kumar Patro, Global CISO and Head IT Platform, KEC International 22 May 202426 mins CSO and CISO video CSO Executive Session India with Hilal Lone, CISO, Razorpay 11 Jun 202429 mins CSO and CISO video CSO Executive Sessions: The new realities of the CISO role – whistleblowing and legal liabilities 28 May 202417 mins CSO and CISO video CSO Executive Sessions India with Pradipta Kumar Patro, Global CISO and Head IT Platform, KEC International 22 May 202426 mins CSO and CISO