newsThe US offers a $2.5M bounty for the arrest of Angler Exploit Kit co-distributorThe State Department has placed a bounty of up to $2.5 million on information leading to Volodymyr Kedariya’s arrest.By Shweta Sharma29 Aug 20243 minsHackingCybercrime news Ransomware attack paralyzes milking robots — cow deadBy Martin Bayer07 Aug 20242 minsRansomwareAgriculture IndustryCybercrimenews analysis North Korean group infiltrated 100-plus companies with imposter IT pros: CrowdStrike reportBy Cynthia Brumfield06 Aug 20248 minsCyberattacksThreat and Vulnerability ManagementCybercrime newsWho are the two Russian convicts released in the US-Russia prisoner swap?By Shweta Sharma 02 Aug 20243 minsCybercrime featureHow cybercriminals recruit insiders for malicious actsBy Dov Lerner 16 Jul 202417 minsCybercrime featureLogic bombs explained: Definition, examples, preventionBy Josh Fruhlinger 05 Jul 202412 minsMalwareCybercrimeSecurity brandpostSponsored by CyberArkWhy identity security Is essential to cybersecurity strategyBy Claudio Neiva, CyberArk’s Field Technology Director (LATAM), PAM and Identity Security 24 Jun 20246 minsCybercrime brandpostSponsored by CyberArkUnderstanding APIs and how attackers abuse them to steal dataBy John Walsh, senior product marketing manager at CyberArk 24 Jun 20245 minsCybercrime newsScattered Spider arrest in Spain unlikely to stop cybercrime groupBy John Leyden 18 Jun 20244 minsCybercrime ArticlesbrandpostSponsored by CyberArkThe growing threat of identity-related cyberattacks: Insights into the threat landscapeNew CyberArk research finds the rise of machine identities and increasing reliance on third-party providers is deepening threats and creating novel vulnerabilities.By Brandon Traffanstedt, senior director in CyberArk’s Field Technology Office 14 Jun 2024 6 minsCybercrimefeatureDeepfakes: Coming soon to a company near youAI-powered deepfake technology is rapidly advancing, and it’s only a matter of time before cybercriminals find a business model they can use, some security experts say.By Grant Gross 14 Jun 2024 8 minsPhishingCybercrimenewsMicrosoft: The brand attackers love to imitateCybercriminals often hide attack attempts behind well-known brand names with the intent to trick targeted users into making the fatal click. Microsoft is their favorite — by far.By Martin Bayer 03 Jun 2024 3 minsPhishingEmail SecurityCybercrimenews‘Operation Endgame’ deals major blow to malware distribution botnetsThe law enforcement operation has disrupted key infrastructure of the cybercrime ecosystem in what may be the largest botnet takedown of all time.By Lucian Constantin 30 May 2024 4 minsBotnetsMalwareCybercrimenewsWorld’s largest botnet seized in Federal bust, Chinese national arrestedThe botnet infected computers in nearly 200 countries, facilitating financial fraud, identity theft, and child exploitation.By Shweta Sharma 30 May 2024 4 minsBotnetsCybercrimenewsKroll cyber threat landscape report: AI assists attackers AI is simplifying all sorts of tasks — and not always for the better: cybercriminals, too, are adopting it.By Lynn Greiner 24 May 2024 4 minsThreat and Vulnerability ManagementCybercrimeVulnerabilitiesnews analysisEmerging ransomware groups on the rise: Who they are, how they operateNew and developing ransomware gangs move to fill the void left by the shutdown and law enforcement disruption of big players, with differing tactics and targets.By Lucian Constantin 24 May 2024 6 minsRansomwareCybercrimenewsTracking manual attacks may deliver zero-day previewsAccording to analysis from LexisNexis, human-based digital fraud attacks are increasing more quickly than bot-based attacks — a difference CISOs should leverage for their defenses.By Evan Schuman 23 May 2024 4 minsCyberattacksFraudCybercrimenewsLockBit no longer world’s No. 1 ransomware gangAfter dominating for eight months, LockBit has been overtaken by ransomware gang Play in the wake of a law enforcement crackdown and unmasking of LockBit’s alleged creator.By Viktor Eriksson 23 May 2024 2 minsRansomwareCybercrimenews analysisGlobal stability issues alter cyber threat landscape, ESET reportsWith conflict on the rise, regional APT groups are increasing activity, altering focus, and putting specific industries in their crosshairs. Here’s what CISOs should know.By Evan Schuman 20 May 2024 4 minsAdvanced Persistent ThreatsCyberattacksThreat and Vulnerability ManagementnewsBreachForums seized by law enforcement, admin Baphomet arrested Official telegram channels operated by BreachForums members confirm law enforcement seizures and arrest. By Shweta Sharma 16 May 2024 4 minsData BreachCybercrimenewsAdministrator of ransomware operation LockBit named, charged, has assets frozenA Russian national alleged to have been the administrator of the notorious and prolific LockBit ransomware provider faces international charges. A $10-million reward for the suspect’s arrest has been offered.By Lucian Constantin 07 May 2024 3 minsAdvanced Persistent ThreatsHacker GroupsRansomware Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management whitepaper 2023 GigaOm Radar Report on Autonomous Security Operation Center (SOC) Solutions [XSIAM] By Palo Alto Networks 11 Jul 2024Artificial IntelligenceSecuritySecurity Software whitepaper XSIAM E-Book: Machine-Led, Human-Empowered Platform By Palo Alto Networks 11 Jul 2024SecuritySecurity InfrastructureSecurity Operations Center View all Video on demand videoAn inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another. 08 Aug 2018 10 minsPhishingEmail ClientsCybercrime What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39 07 Aug 2018 15 minsPhishingEmail ClientsCybercrime An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40 06 Aug 2018 7 minsPhishingEmail ClientsCybercrime Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37 30 Jul 2018 PhishingEmail ClientsCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO