Trends in cybersecurity across 2024 showed less malware and phishing, though more social engineering. CrowdStrike offers tips on securing your...more
social engineering
‘Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security
The phishing-as-a-service kit from Sneaky Log creates fake authentication pages to farm account information, including two-factor security codes.

XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor
A threat actor quietly spent the last two years integrating themself in the core team of maintainers of XZ Utils,...more

UK’s NCSC Issues Warning as SVR Hackers Target Cloud Services
Russian state hackers are adapting their techniques to target organizations moving to the cloud, an advisory from the UK National...more

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways
Highlights from CrowdStrike’s 2024 report: Identity-based and social engineering attacks still take center stage. Cloud-environment intrusions have increased by 75%...more

ISC2 Research: Most Cybersecurity Professionals Expect AI to Impact Their Jobs
Most cybersecurity professionals (88%) believe AI will significantly impact their jobs, according to a new survey by the International Information...more

National Cyber Security Centre Study: Generative AI May Increase Global Ransomware Threat
The U.K.’s National Cyber Security Centre has released a new study that finds generative AI may increase risks from cyber...more

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware
Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat. A new report...more

Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks
A November report from Google Cloud details possible nation-state malware tactics in 2024 and new angles of cyberattacks. What will...more

Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date
A new report from Microsoft Incident Response and Microsoft Threat Intelligence teams exposed the activities and constant evolution of a...more