Data Management
SecurityIncreasing Awareness of DNS Hijacking: A Growing Cyber Threat
Read more about DNS hijacking and how organizations can prevent it.
Cedric Pernet is a senior threat expert with a strong focus on cybercrime and cyberespionage. He currently works at Trend Micro. Prior to that position, he worked for several Computer Emergency Response Teams (CERTs) where he did threat intelligence investigations, incident response, and computer forensics. He was also a Law Enforcement Officer working on Cybercrime in France. He is the author of a paperbook in French language on cyberespionage and an influential person in the cybersecurity community.
EducationNetwork communications
Personal QuoteBruce Schneier - "If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology."
Read more about DNS hijacking and how organizations can prevent it.
Russian hackers, known as Midnight Blizzard, launch targeted spear-phishing on U.S. officials, exploiting RDP files to gain access to data.
Read more about a joint operation between several law enforcement agencies across the globe to tackle RedLine Stealer and META malware.
It only takes five days on average for attackers to exploit a vulnerability, according to a new report.
A new report reveals a 2024 surge in mobile, IoT, and OT cyberattacks, highlighting key trends and the need for zero-trust security.
Study reveals alarming risks of AI medical advice from Copilot and highlights the urgent need for professional guidance in healthcare.
Read more about the U.S. Department of Justice and Microsoft’s efforts to interrupt the activities of Russian-based threat actor Star Blizzard, and learn how to protect from this threat.
Read more about a China-linked threat actor that has compromised more than 260 000 devices worldwide to facilitate DDoS and other targeted attacks.
Read more about an attack campaign led by Iran-based cyberespionage threat actor Fox Kitten, and learn how to protect your company from this threat.
Threat actors are abusing Microsoft Sway to host QR Code phishing campaigns.