SecurityWeek Briefing: Cybersecurity News

Latest cybersecurity news, insights, and analysis from "SecurityWeek Briefing."

Views expressed in this cybersecurity, cybercrime update are those of the reporters and correspondents.  Accessed on 06 November 2022, 1409 UTC.  Content supplied by "SecurityWeek Briefing."


Please click link or scroll down to read your selections.  

Russ Roberts


Sentinel One has found evidence suggesting that the Black Basta ransomware is linked to the FIN7 cybercrime group. [Read More]
The Red Cross is seeking support to create a “digital red cross/red crescent emblem” that would make clear to military and other hackers that they have entered the computer systems of medical facilities or Red Cross offices. [Read More]
Managed detection and response provider Binary Defense Systems this week announced it has raised $36 million in its first funding round. [Read More]
Trains stopped in Denmark over the weekend as a result of a cyberattack targeting an IT subcontractor. [Read More]
Ukraine and Russia are fighting “a new type of war,” with cyberweapons and other types of digital technology playing a pivotal role, Microsoft's Brad Smith said. [Read More]
Cisco has released patches for high-severity vulnerabilities in Identity Services Engine, Email Security Appliance, Secure Email and Web Manager, and Secure Web Appliance. [Read More]
Join Mastercard’s Johan Gerber, EVP, Cyber and Security Products, as he discusses the strategies and tools needed to mitigate ESG risk on a business’s supply chain and reputation. [Read More]
Splunk on Wednesday announced the release of patches for multiple vulnerabilities in Splunk Enterprise, including nine high-severity issues. [Read More]
A French-speaking cybercrime group tracked as Opera1er may have stolen more than $30 million from banks and other organizations. [Read More]
Multiple vulnerabilities in IT Infrastructure monitoring solution Checkmk could be chained to execute code remotely, without authentication. [Read More]


rss icon

Derek Manky's picture
Organizations may better align their defenses to adapt and react proactively to rapidly changing attack approaches when they have a better grasp of the objectives and strategies employed by their adversaries.
Jeff Orloff's picture
By focusing on attack tactics and techniques that pose clear and present danger to the business, a company can achieve the greatest return on its training initiatives.
Gordon Lawson's picture
The new SEC requirements are putting on paper what many companies—public and private—should have been investing in already.
Landon Winkelvoss's picture
How organizations can use managed services to optimize their threat intelligence program during an economic downturn.
Torsten George's picture
Here are five best practices for defeating against most attacks, hopefully making the need for future Cybersecurity Awareness Months obsolete.
Marc Solomon's picture
Within the context of security operations, anticipation teams use internal and external threat and event data across their security infrastructure for context and analytics and to become more proactive.
Marie Hattar's picture
Cybersecurity within the automotive industry has a long way to go to catch up to traditional enterprise cybersecurity standards and best practices.
Gordon Lawson's picture
Why are zero day exploits so effective, and so highly prized by bad actors? The reason has to do with the way cyber security defenses work.
John Maddison's picture
By integrating with native security services on major cloud platforms, a CNP solution can effectively correlate security findings to pinpoint risks and recommend effective mitigation.
Torsten George's picture
Unfortunately, there is no such thing as 100 percent protection. Therefore, we cannot solely focus on “Left of Boom” processes, but also have to talk about the “Right of Boom”.


Popular posts from this blog

SecurityWeek Briefing.

Cyber War Newswire

SecurityWeek Briefing.