Stolen credentials increasingly empower the cybercrime underground
New research shows that criminal gangs are focusing more on acquiring stolen credentials to bypass security measures.
New research shows that criminal gangs are focusing more on acquiring stolen credentials to bypass security measures.
The threat actor uses the malware to target critical government infrastructure employees, manufacturing companies, and others.
The quickly fixed flaw could have allowed attackers to take over accounts in the CDE and perform remote code execution.
Avoid these simple mistakes when setting up OAuth for third-party authentication to block unauthorised account access.
The PyPI package flood is just the latest in a string of attacks on public repositories with the intent to plant malicious code.
The antivirus exclusion might cause Exchange Server failures or prevent the detection of backdoors planted by attackers.
Study and prepare for these five threats and you will be well on your way to protecting your network, assets, and employees.
Malware authors and cybercriminal groups are making sophisticated techniques practical for threat actors to use more widely, changing threat models.
Researchers demonstrate how attackers can target PLCs to bypass authentication and perform remote code execution on industrial networks.
Greater use of industrial cellular gateways and routers expose IIoT devices to attackers and increase the attack surface of OT networks.
Researchers demonstrate how attackers can use the GPT-3 natural language model to launch more effective, harder-to-detect phishing and business email compromise campaigns.
Atlassian has issued fixed versions of the software and described a workaround to the flaw that could make access tokens available to attackers.
Changing tactics by North Korean, Russian, and Chinese APT groups suggest that Western companies are at greater risk.
Researchers found four vulnerabilities in vRealize Log Insight that were relatively non-threatening on their own but lead to significant compromise when used together.
The decline of big ransomware groups like Conti and REvil has given rise to smaller gangs, presenting a threat intelligence challenge.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.
By Kalyan Madala, CTO, IBM ASEANZK