Remove posts defending-your-organization-from-cybercrime
article thumbnail

What you need to know about Okta’s security breach

CIO

Once inside the system, the hacker gained access to files uploaded by Okta customers using valid session tokens from recent support cases. As a result of using the extracted tokens from the Okta support system and support cases, the threat actor subsequently gained complete access to many of their customers’ systems.

article thumbnail

3 Ways the Threat Landscape Is Changing

Palo Alto Networks

Our new e-book, Secure From Every Angle, details the latest trends in cybersecurity and how organizations can stay ahead. Malicious actors persistently discover new methods to target and exploit organizations, while defenders continuously innovate to counteract and address these threats. Here are a few quick pointers: 1.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Combating Ransomware Attacks: Insights from Unit 42 Incident Response

Palo Alto Networks

Ransomware attacks have evolved over the years from a threat primarily targeting individuals with modest ransom demands, to a sophisticated form of cybercrime that now jeopardizes large companies, government agencies and critical infrastructure. I recently had the opportunity to testify before two subcommittees of the U.S.

article thumbnail

Ransomware as a Service: Defend by Reinvesting in the Fundamentals

Palo Alto Networks

Ransomware as a service (RaaS) is a business model designed for criminals, by criminals that lowers the technical barrier for entry into cybercrime. In no particular order, I've listed a few areas that I believe are good jumping-off points to start conversations in your organization about defense in-depth strategies.

article thumbnail

Cybersecurity Snapshot: ChatGPT-like Tools Will Boost Developers’ Speed – and Amplify Cyber Risk

Tenable

1 – McKinsey: Generative AI will empower developers, but mind the risks Generative AI tools like ChatGPT will supercharge software developers’ productivity, but organizations must be aware of and mitigate the AI technology’s security and compliance risks. Organizations polled use on average eight platforms.

ChatGPT 52
article thumbnail

Sources of cyber intelligence from governments and academia

CTOvision

This post is sponsored by the Enterprise CIO Forum and HP’s Make It Matter. Cyber intelligence is a growing discipline in the cybersecurity community, providing important information for cyber defenders in enterprises large and small. This post reviews key sources of cyber intelligence provided free from governments and academia.

article thumbnail

Unit 42 Strikes Oil in MITRE Engenuity Managed Services Evaluation

Palo Alto Networks

With the overwhelming growth in cybercrime, businesses are turning to managed service providers to help protect and recover from cyberattacks. The focus of this go-round was on the quality of the post-breach threat report that the service provider would deliver. Who is attacking you? What is their objective?

Report 89