article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. Our interconnected online world is no longer separate from our lives, businesses, or our global economy.

article thumbnail

Why stopping stalkerware confounds cybersecurity experts

The Parallax

SAN FRANCISCO—The greatest trick stalkerware, one of the most dangerous forms of malware , ever played was convincing the world that it didn’t exist. Until recently, cybersecurity experts could overlook stalkerware because of the personal nature of how it spreads, its muddled legal status—and how it is detected.

Spyware 230
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

Get the latest on the anniversary of the Log4j crisis; OWASP’s top CI/CD risks; a surge of infostealer malware; the fund transfer fraud — business email compromise connection; and more! . 2 - OWASP’s top 10 CI/CD security risks. 3 - Attackers boost use of infostealer malware.

article thumbnail

Cybersecurity Snapshot: Tips for cloud configs, MSP vetting, CISO board presentations

Tenable

Get the latest on Microsoft 365 security configurations; effective CISO board presentations; rating MSPs’ cybersecurity preparedness; and hospitals’ Daixin cyberthreat. Cybersecurity and Infrastructure Security Agency (CISA) released a set of recommended configuration baselines for the Microsoft 365 product suite. .

Cloud 52
article thumbnail

Cybersecurity Snapshot: Check Out Our No-Holds-Barred Interview with ChatGPT

Tenable

Threat actors could potentially use an AI language model like ChatGPT to automate the creation of malicious content, such as phishing emails or malware, in order to conduct cyberattacks. Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. How can threat actors abuse ChatGPT?

article thumbnail

Your old router could be a hacking group’s APT pawn

The Parallax

Inception Framework’s attack methodology has evolved since it was first detected in 2014 in part by Waylon Grange, senior threat researcher at computer security company Symantec. How to secure your home Wi-Fi. Once the group has profiled the device and tricked the target into installing the hidden malware, it can begin stealing data.

Malware 223
article thumbnail

Enabling Secure Digital Transformation in Healthcare

Palo Alto Networks

As we approach the annual HIMSS conference this month in Chicago, let’s take a moment to look at three key areas and respective security capabilities critical to healthcare providers in 2023 and beyond. However, new clinics and increased remote access can’t come at the cost of security.