
How threat actors are using npm to launch attacks
WhiteSource released a threat report based on malicious activity found in npm, the most popular JavaScript package manager used by developers worldwide. The report is based on …

Exposed corporate credentials threatening the pharma sector
Constella Intelligence released a report which includes new and additional findings pertaining to exposures, breaches, and leakages within the pharma sector, specifically …

Bank executives mostly concerned about cybercrime
A research released by Computer Services suggests growing concerns among bank executives around recruiting and retaining talent as well as fighting cybercrime threats. In the …

Piracy is alive and well, demand reaching 3.7 billion unlicensed streams and downloads
Akamai released a research detailing the persistence of online piracy. The evolving piracy landscape, according to the U.S. Chamber of Commerce’s Global Innovation …

People working in IT related roles equally susceptible to phishing attempts as the general population
Phishing emails that mimic HR announcements or ask for assistance with invoicing get the most clicks from recipients, according to a study from F-Secure. The study, which …

How organizations are arming themselves to combat threats
Reblaze announced the results of a Global Surveyz survey of 300 security professionals, to better understand how organizations are approaching web security as we enter a new …

Review: Group-IB Threat Intelligence & Attribution (TI&A)
Organizations and enterprises that care about business continuity should have an established security program that needs to be reviewed on a regular basis. One of the hardest …

Top attack trends every organization should build resilience against
Expel announced the release of the cybersecurity trends and predictions for 2022. Based on aggregated data from its security operations center (SOC), the report provides …

How costly is an insider threat?
Proofpoint released a report to identify the costs and trends associated with negligent, compromised, and malicious insiders. Notably, on average, impacted organizations spent …

Use of AI to fight insurance fraud hits all-time high
Insurers’ use of predictive analytics to fight fraud has reached an all-time high, according to an insurance fraud technology study by the Coalition Against Insurance Fraud …

Stealthy Excel malware putting organizations in crosshairs of ransomware gangs
The HP Wolf Security threat research team identified a wave of attacks utilizing Excel add-in files to spread malware, helping attackers to gain access to targets, and …

What makes achieving cyber resilience difficult?
Anomali published a report which provides visibility into the current threat landscape, reveals the top challenges to establishing a resilient cybersecurity posture, and …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility