
Cybersecurity

OT/ICS cyber threats escalate as geopolitical conflicts intensify – Help Net Security
Ransomware attacks against industrial organizations surged by 87% over the past year, while new malware families designed specifically for OT environments emerged. These findings highlight a troubling trend: OT systems are increasingly becoming mainstream targets, and even sophisticated threat actors use relatively unsophisticated tactics to infiltrate and disrupt industrial operations. State-sponsored groups embed themselves in…

Quantifying ROI: Understanding the impact of cybersecurity products and services on cyber insurance claims
Cyber insurance claim values are an effective way to quantify the impact of cyberattacks on organizations. A higher claim value indicates that the victim experienced considerable financial and operational consequences from the attack, while a low claim value reflects limited disruption. Reducing the value of cyber insurance claims is to everyone’s advantage. For clients, lower…

DeceptiveDevelopment targets freelance developers
Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers. After all, what better time to strike than when the potential victim is distracted by the possibility of getting a job? Since early 2024, ESET researchers have observed a series of malicious North Korea-aligned activities,…

Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts
More than a year’s worth of internal chat logs from a ransomware gang known as Black Basta have been published online in a leak that provides unprecedented visibility into their tactics and internal conflicts among its members. The Russian-language chats on the Matrix messaging platform between September 18, 2023, and September 28, 2024, were initially…

Trump 2.0 Brings Cuts to Cyber, Consumer Protections – Krebs on Security
One month into his second term, President Trump’s actions to shrink the government through mass layoffs, firings and withholding funds allocated by Congress have thrown federal cybersecurity and consumer protection programs into disarray. At the same time, agencies are battling an ongoing effort by the world’s richest man to wrest control over their networks and…

Security Awareness Trainings: Schulungen richtig managen
Lesen Sie, welche Aspekte besonders entscheidend sind, damit Ihr Security Awareness Training erfolgreich ist. Foto: nialowwa – shutterstock.com Studien wie die von Verizon oder IBM zeigen immer wieder auf, dass die Manipulation von zwischenmenschlichen Verhaltensweisen die vielversprechendste Vorgehensweise ist, um Zugang zu sensiblen Daten zu erlangen. Social Engineering bleibt die größte, fortbestehende Herausforderung der Cybersicherheit….

What are Network Packets and How Do They Work? | Definition from TechTarget
A network packet is a basic unit of data that is transferred over a computer network, typically a packet-switched network, such as the internet. Before data like files, images, videos or emails are transmitted over a network, they are first divided into packets. Upon arrival at their destination, the packets are reassembled to form the…

Investigators Link $1.4B Bybit Hack to North Korea’s Lazarus Group
Bybit, the world’s second-largest cryptocurrency exchange, suffered a devastating $1.4 billion Ethereum (ETH) hack from a cold wallet breach on February 21, 2025. In the days following the attack, independent blockchain investigator ZachXBT traced the stolen funds directly to North Korea’s Lazarus Group, a notorious state-backed hacking organization. His findings were confirmed by Arkham Intelligence,…

Versa Sovereign SASE enables organizations to create self-protecting networks – Help Net Security
Versa releases Versa Sovereign SASE, allowing enterprises, governments, and service providers to deploy customized networking and security services directly from their own infrastructure in a “do-it-yourself” model. This approach addresses the growing demand for greater control amidst evolving data privacy regulations, heightened security threats, and challenges posed by reliance on third-party SaaS infrastructure. The benefits…

Beyond the hype: The business reality of AI for cybersecurity
AI is firmly embedded in cybersecurity. Attend any cybersecurity conference, event, or trade show and AI is invariably the single biggest capability focus. Cybersecurity providers from across the spectrum make a point of highlighting that their products and services include AI. Ultimately, the cybersecurity industry is sending a clear message that AI is an integral…