Terry Young, Director of Service Provider Product Marketing, A10 Networks explores the most pressing attack vector for organisations to be aware of in the coming months.
“AI is creating another avenue for cybercriminals to exploit” – Fady Younes, Cisco
Fady Younes, Cybersecurity Director, EMEA Service Providers and MEA, at Cisco, has penned an exclusive thought leadership article for tahawultech.com …
IT experts concerned ChatGPT could be exploited by cybercriminals
ChatGPT exploded into the public domain in November last year, and since then has continued to dominate column inches globally. …
Preventing the Log4j exploit and Botnets from impacting your organisation
(A10 Networks): Understanding and Preventing the Log4j Exploit and Botnets.
Adversaries exploit stolen session cookies to bypass Multi Factor Authentication & gain access to corporate resources: Sophos Report
Sophos, a global leader in next-generation cybersecurity, has announced in the Sophos X-Ops report, “Cookie stealing: the new perimeter bypass,” …
Mandiant Reveals More Zero-Days Exploited in 2021 Than Ever Before
Mandiant Reveals More Zero-Days Exploited in 2021 Than Ever Before.
Attempts to exploit MS Exchange and password guessing were the most frequent intrusion vectors
ESET Threat Report: Attempts to exploit MS Exchange and massive waves of password guessing were the most frequent intrusion vectors.
Top streaming platforms and shows exploited by cybercriminals discovered
How to get away with malware: top streaming platforms and shows exploited by cybercriminals discovered.
APT actors increasingly turn to exploits to launch attacks
Advanced threat actors are continuously changing their tactics, sharpening their toolsets, and launching new waves of activity. That’s why, to keep users and organisations informed about the threats they face, Kaspersky’s Global Research and Analysis team provides quarterly reports about the most important developments in the advanced persistent threat landscape.
New report examines how cybercriminals exploit Office 365 vulnerabilities
A new report published by Vectra examined how cybercriminals are using built-in Office 365 services in their attacks on enterprises.
Vectra reveals growing exploitable attack surface among healthcare firms
Vectra AI has released its 2020 Spotlight Report on Healthcare, which shows an upward trend in exploitable behaviours and discredits claims that external threats would lead to increased internal threat activity.
Kaspersky Lab uncovers new Windows zero-day exploit
Kaspersky Lab technologies have automatically detected a new exploited vulnerability in the Microsoft Windows OS kernel, the third consecutive zero-day exploit to be discovered in three months.
Trump criticises Amazon for exploiting US postal system
US president Donald Trump accused Amazon.com on Thursday of not paying sufficient tax, exploiting the US postal system and putting …
“Hackers exploiting UAE devices to mine cryptocurrency”: Geeks
UAE-based on-demand IT services provider Geeks.ae has offered its top tips to prevent cybercriminals from exploiting user devices to mine …
Hackers could exploit AI to mount attacks, experts warn
The report claims that malicious uses of AI could lead to driverless car crashes, or result in commercial drones being converted into targeted weapons.
Digital deal to fight worker exploitation: Indian official
The UAE and India have signed an historic agreement that could stop unscrupulous local employers who fail to deliver on …
6 ways hackers exploit machine learning tools
Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.
Kaspersky Lab uncovers new zero day exploit
Kaspersky Lab’s advanced exploit prevention system has identified a new Adobe Flash zero day exploit, used in an attack on 10 October by a threat actor known as Black Oasis.
Mimecast warns against latest email exploit ‘ROPEMAKER’
Using this latest exploit, Mimecast claims that a malicious actor can change the displayed content in an email at will.
Exploit leaks led to 5M attacks in Q2: Kaspersky
Exploit packages in-the-wild became the game changer of the cyber threat landscape in Q2 2017. In just 3 months, according …