Cybercrime gets a few punches on the nose
Law enforcement took down several cybercrime forums that sold tools and data to other cybercriminals
Read moreLaw enforcement took down several cybercrime forums that sold tools and data to other cybercriminals
Read moreCredit to Author: Chris LaFleur| Date: Thu, 30 Jan 2025 00:00:00 +0000
Network Detection and Response (NDR) is no longer a ‘nice-to-have’—it’s essential. NDR complements EDR, accelerates incident response, and enhances visibility, making it a critical tool for modern cybersecurity strategies and service providers.
Read moreCredit to Author: Lily Hay Newman, Matt Burgess| Date: Wed, 29 Jan 2025 21:34:22 +0000
China-based DeepSeek has exploded in popularity, drawing greater scrutiny. Case in point: Security researchers found more than 1 million records, including user data and API keys, in an open database.
Read moreCredit to Author: BrianKrebs| Date: Thu, 30 Jan 2025 17:10:08 +0000
In an effort to blend in and make their malicious traffic tougher to block, hosting firms catering to cybercriminals in China and Russia increasingly are funneling their operations through major U.S. cloud providers. Research published this week on one such outfit — a sprawling network tied to Chinese organized crime gangs and aptly named “Funnull” — highlights a persistent whac-a-mole problem facing cloud services.
Read moreJust days after we uncovered a campaign targeting Google Ads accounts, a similar attack has surfaced, this time aimed at Microsoft…
Read moreThe sudden rise of DeepSeek has raised questions of data origin, data destination, and the security of the new AI model.
Read moreCredit to Author: Buddy Tancio| Date: Thu, 30 Jan 2025 00:00:00 +0000
The Managed XDR team investigated a sophisticated campaign distributing Lumma Stealer through GitHub, where attackers leveraged the platform’s release infrastructure to deliver malware such as SectopRAT, Vidar, and Cobeacon.
Read moreCredit to Author: Chris LaFleur| Date: Wed, 29 Jan 2025 00:00:00 +0000
ASRM transforms cyber insurance underwriting by integrating real-time risk assessments, advanced tools (NDR, EDR, Cloud Security, MDR), and proactive mitigation strategies to improve accuracy, reduce claims, and build trust.
Read more