
Cybersecurity

The Bite from Inside: The Sophos Active Adversary Report
It’s not news that 2024 has been a tumultuous year on many fronts. For our second Active Adversary Report of 2024, we’re looking specifically at patterns and developments we noted during the first half of the year (1H24). Though the year itself was in many ways unremarkable on the surface for those charged with the…

Emerging Threats, Vulns to Prepare for in 2025
In 2024, we at Dark Reading covered a variety of attacks, exploits, and, of course, vulnerabilities across the board. Here, we recount 10 emerging threats organizations should be prepared for — as detailed by Dr. Jason Clark in “10 Emerging Vulnerabilities Every Enterprise Should Know,” a Dark Reading webinar — as they continuously rise and…

Achieving cybersecurity compliance in 5 steps
Business Security Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements 03 Dec 2024 • , 6 min. read We’ve all been there – creating short- or long-term plans to achieve certain personal goals. However, business planning often…

AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case
Cybersecurity researchers have found that it’s possible to use large language models (LLMs) to generate new variants of malicious JavaScript code at scale in a manner that can better evade detection. “Although LLMs struggle to create malware from scratch, criminals can easily use them to rewrite or obfuscate existing malware, making it harder to detect,”…

How to Lose a Fortune with Just One Bad Click – Krebs on Security
Image: Shutterstock, iHaMoo. Adam Griffin is still in disbelief over how quickly he was robbed of nearly $500,000 in cryptocurrencies. A scammer called using a real Google phone number to warn his Gmail account was being hacked, sent email security alerts directly from google.com, and ultimately seized control over the account by convincing him to…

4 Wege zu neuer Cyberabwehrstärke
Generative AI kann traditionellen Sicherheitsmaßnahmen neuen “Schwung” verleihen. Henri Studios | shutterstock.com Von Smartphones und Wearables über IoT-Geräte bis hin zu Cloud-Infrastrukturen – die Bandbreite und Komplexität unseres digitalen Ökosystems nimmt weiterhin in beispiellosem Tempo zu. Parallel wächst auch die Zahl der Schwachstellen und Backdoors, was sich in verheerenden Cyberattacken manifestiert. Nur drei Beispiele aus…

10 cybersecurity predictions for 2025 | TechTarget
Every year around this time, industry experts and analysts look at the top cybersecurity trends, predictions and challenges for the next year. Experts forecasted a rise in generative AI (GenAI) and large language models in 2024, as well as continued ransomware attacks and third-party supply chain challenges. These trends rang true as threat actors…

U.S. Telecom Networks Security: SS7 Vulnerabilities & CISA Tips
The security of U.S. telecom networks has come under fresh scrutiny in recent months, with the latest example coming this week when the Cybersecurity and Infrastructure Security Agency (CISA) recommended that individuals in need of high security use encrypted messaging apps for mobile communications. Concern grew in October when CISA and the FBI confirmed that…

Biggest Crypto Scam Tactics in 2024 and How to Avoid Them
Stay alert to crypto scams with our guide to 2024’s top threats, including phishing, malware, Ponzi schemes, and fake wallets. Learn how to protect your assets today! With the increasing adoption and user base of cryptocurrencies and crypto markets also comes a growing number of scammers and frauds. There are many ways in which conmen…

AI is becoming the weapon of choice for cybercriminals – Help Net Security
This article highlights key findings from 2024 reports on AI and GenAI technologies, focusing on their potential and major challenges. Overreliance on GenAI to develop software compromises security 96% of security and software development professionals report that their companies use GenAI-based solutions for building or delivering applications. Among these respondents, 79% report that all or…