
Cybersecurity

Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense
Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving cybersecurity risks. Cybersecurity threats are no longer luxuries of the big corporations and reach every part of our connected world making big and small businesses both vulnerable. With attacks becoming smarter and more sophisticated, traditional security measures…

The ongoing evolution of the CIS Critical Security Controls – Help Net Security
For decades, the CIS Critical Security Controls (CIS Controls) have simplified enterprises’ efforts to strengthen their cybersecurity posture by prescribing prioritized security measures for defending against common cyber threats. In this article, we’ll review the story of the CIS Controls before taking a closer look at the current version. A brief history of the CIS…

Prioritizing patching: A deep dive into frameworks and tools – Part 1: CVSS
Back in August 2022, Sophos X-Ops published a white paper on multiple attackers – that is, adversaries targeting the same organizations multiple times. One of our key recommendations in that research was to prevent repeated attacks by ‘prioritizing the worst bugs first’: patching critical or high-profile vulnerabilities that could affect users’ specific software stacks. While…
_Antony_Cooper_Alamy.jpg?disable=upscale&width=1200&height=630&fit=crop&w=600&resize=600,400&ssl=1)
EagerBee Backdoor Takes Flight Against Mideast Targets
An unknown attacker is wielding an updated version of a backdoor malware that was previously deployed against high-profile Southeast Asian organizations in targeted attacks, this time against ISPs and governmental entities in the Middle East. Researchers at Kaspersky have detected a new variant of the EagerBee backdoor outfitted with various new components in attacks that…

Bootkitty: Analyzing the first UEFI bootkit for Linux
UPDATE (December 2nd, 2024): The bootkit described in this report seems to be part of a project created by cybersecurity students participating in Korea’s Best of the Best (BoB) training program. As they informed us: “The primary aim of this project is to raise awareness within the security community about potential risks and to encourage…
![⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan] ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]](https://i2.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKokWQpcRQ55ARtaBLhn4X9RCRcf5u5YW7JaJaQrIrcU6A96dBP2IS5th1jhuZX0cQMO04KAMOZDxqEIcPdkAqGmkXMpHzV7L_CECca3FJ_ppgWQh9J0y8D02mSQbw-nzuf-FzDIN412s_F2AO-MGpfr95e-yMTzPjQqkl-WKo8jY1o6XMVvnF7bEmngEk/s728-rw-e365/recap.png?w=600&resize=600,400&ssl=1)
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
Jan 06, 2025Ravie Lakshmanan Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for attackers. The line between convenience and vulnerability has never been thinner….

How Cryptocurrency Turns to Cash in Russian Banks – Krebs on Security
A financial firm registered in Canada has emerged as the payment processor for dozens of Russian cryptocurrency exchanges and websites hawking cybercrime services aimed at Russian-speaking customers, new research finds. Meanwhile, an investigation into the Vancouver street address used by this company shows it is home to dozens of foreign currency dealers, money transfer businesses,…

Microsoft Sentinel: A cloud-native SIEM with integrated GenAI
In a recent survey, 74% of cybersecurity professionals said that the threat landscape is the worst they’ve seen in 5 years.1 Escalating cyber threats, an expanding attack surface, and staffing shortages are putting tremendous pressure on the security operations center (SOC). It’s never been more important to have the right tools in place, especially when…

Top 7 Enterprise Cybersecurity Challenges in 2025
When was the last “easy” year for enterprise security teams? Certainly not last year, this decade or even this century. Every year in recent memory has seen its share of noteworthy and novel cyberattacks. It doesn’t take a crystal ball to predict 2025 will be more of the same. If anything, the pace and…

Cyble Weekly Vulnerability Insights Shares New Vulnerabilities
Overview Cyble Research & Intelligence Labs (CRIL) has released its latest Weekly Vulnerability Insights report, offering a detailed overview of the critical vulnerabilities discovered between December 25, 2024, and December 31, 2024. The report highlights key security threats and vulnerabilities, including the addition of a major exploit to the Cybersecurity and Infrastructure Security Agency (CISA)…