Threat
PharMerica Breach: The Lure of Health Care Data
Two months after noticing suspicious activity in its systems, PharMerica disclosed that nearly six million patients had their health care data stolen by threat actors. The large pharmacy services company, which has ...
Understanding the Potential Risks of Using ChatGPT and AI
The capabilities of artificial intelligence (AI) such as ChatGPT have prompted the global market to increasingly adopt generative AI in their organizations. However, there are potential legal and business risks associated with ...
What You Need to Know About the Cyber Threat Landscape in 2023
Our new report dives into the perpetual cycles of cybercrime and shows organizations how consolidated intelligence empowers them to fight back The post What You Need to Know About the Cyber Threat ...
Following the Money: Killnet’s ‘Infinity Forum’ Wooing Likeminded Cybercriminals
Pro-Kremlin hacktivist DDoS group Killnet has created a new illicit forum, called Infinity, that hopes to bridge the gap between hacktivists and cybercriminals—and continue its quest for money and notoriety. The post ...
Cybercrime Threat Intelligence is More Critical Than Ever
As the old saying goes, knowledge is power. And in the world of cybersecurity, that could not be more true. Security teams need to have access to timely and relevant threat intelligence ...
What to Know about APIs, the “On-Ramps to the Digital World”
An application programming interface, or API, is a defined process that allows data to be shared between applications or programs. Each API consists of a set of rules that dictates how communication ...
Threat-Informed Defense 101: Understanding the Basics
Over the last decade, the MITRE ATT&CK knowledge base has been widely adopted by thousands of security defenders, ultimately forming a strong community for ATT&CK users. Security teams have leveraged ATT&CK to ...
Convergence and adoption of AI and ML countering the cyber threat
During the last few years, we have witnessed an increase in advanced cyber attacks. Cybercriminals utilize advanced technology to breach the digital boundary and exploit enterprises’ security vulnerabilities. No industry feels secure; ...
The State of Data Security in 2022: The CISOs Perspective
In the two years proceeding from the beginning of the COVID-19 pandemic, the business world has been transformed on a grand scale. Organizations have created more data than ever before, data is ...
Defense in Depth to minimize the impact of ransomware attacks
Ransomware attacks continue to plague organizations globally regardless of their size. In a press release by the NCC group that preceded the Annual Threat Monitor Report 2021 published for the year 2021, ...