New report shows rise in cloud account breaches

New report shows rise in cloud account breaches

A recent report by Red Canary delves into the current threat landscape that security leaders need to be aware of in the upcoming months and years. By analyzing almost 60,000 threats across endpoints, cloud infrastructure, networks, identities, and SaaS applications from various customers, the report identified key trends. While many threat tactics remained consistent, there […]

Newly discovered phishing campaign distributing remote access trojans

A recent discovery by FortiGuard Labs has exposed a phishing campaign that is spreading VCURMS and STRRAT remote access trojans. This campaign tricks targets into downloading a malicious Java downloader, enabling threat actors to deliver malware. The malware is hosted on public services and distributed through emails. Insights from Security Leaders Jason Soroko, Senior Vice […]

A report forecasts the top risks expected in 2024

Ontinue has released a report detailing emerging cybersecurity threats. This report analyzed around 600,000 endpoints in order to identify the most prevalent threats and make predictions about evolving threats in the future. Security leaders are encouraged to consider the key trends highlighted in the report, including:  Nearly 50% of analyzed ransomware incidents targeted the construction […]

Inheritance scams have targeted 15% of adults

Payment and financial scams were examined in a recent Visa report. The report revealed that while the number of individual scam reports from June to December 2023 decreased, the total money lost increased, indicating that scammers are using more effective and costly schemes to target victims. The report highlighted top consumer scams: “Pig butchering” scams: […]

DHS Suggests New Reporting Regulations for Critical Infrastructure

The Department of Homeland Security (DHS) has introduced a proposed set of regulations for reporting on critical infrastructure incidents. These rules will outline the requirements for critical infrastructure organizations to report cyberattacks or other cyber incidents to the federal government. The Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) mandates that the reporting process be […]

New study shows a reemerged botnet attacking outdated devices

Recent research conducted by the Black Lotus Labs team at Lumen Technologies has uncovered ongoing efforts to target end-of-life (EoL) and IoT devices. A key focus of this campaign is on small home and small office routers, with the use of an updated version of malware known as TheMoon. John Bambenek, President at Bambenek Consulting, […]

Protecting PII and other important data: Strategies for security leaders

Security leaders must be cautious when safeguarding personally identifiable information (PII) due to the constantly evolving restrictions and guidelines. Data is ubiquitous in today’s society, ranging from company-wide information to an individual employee’s password. Shiva Nathan, the Founder and CEO of Onymos, offers insights on the recent government requirements for PII protection and how security […]

Government agencies join forces to develop a comprehensive guide for combating DDoS attacks

The CISA, FBI and Multi-State Information Sharing and Analysis Center (MS-ISAC) collaborated to create a document guideline for organizations to defend against DDoS attacks. As DDoS attacks can be a challenge to trace and block, the vector is often leveraged by hacktivists, nation-state groups and other politically motivated actors. Therefore, government websites are common targets.  The […]

FTC Rejects Request for New COPPA Application

The Federal Trade Commission (FTC) has declined an application “without prejudice” by the Entertainment Software Rating Board, Yoti, and SuperAwesome for FTC approval of a new method for obtaining parental consent under the Children’s Online Privacy Protection Rule (COPPA Rule). The applicants in 2023 sought approval for the use of “Privacy-Protective Facial Age Estimation” technology, […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC