Remove threat-profiles
article thumbnail

New Cloud Threat Research on Software Supply Chain Attacks

Palo Alto Networks

With the growing threat of supply chain attacks, as evidenced by recent high-profile breaches like SolarWinds and Kaseya VSA , Palo Alto Networks Unit 42 cloud threat researchers sought to understand these types of attacks in order to help organizations protect against them. Third-Party Code Is Rarely Trustworthy.

article thumbnail

Counter Threat Unit Researchers Publish Threat Group Definitions

SecureWorks

Counter Threat Unit Researchers Publish Threat Group Definitions The goals of sharing these profiles are to provide insight into CTU characterizations, encourage feedback, and promote discussions within the security community.

Groups 82
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

HiddenLayer emerges from stealth to protect AI models from attacks

TechCrunch

As in any industry, fighting security threats is a never-ending task. Sestito, the former director of threat research at Cylance and VP of engineering at Qualys, co-founded the company several months ago with Tanner Burns and Jim Ballard. ” (Cook is unaffiliated with HiddenLayer.) .

article thumbnail

3 ways to deter phishing attacks in 2023

CIO

Even though email phishing – deceptive messages designed to trick a person into sharing sensitive data (or even money) or inject malicious software into the recipient’s system – is one of the oldest tricks in the book, email cyberattacks account for 90% of all data breaches even today, according to research by Hoxhunt. Let’s dig deeper.

Security 352
article thumbnail

How CIOs Are Addressing The “Unsustainable” Security Challenge

CIO

The proliferation of cyber threats has become so great that earlier this year the Australian government issued the recommendation that organisations “ urgently ” adopt an enhanced cyber security posture. Understanding where the threats lie.

article thumbnail

AI chip startup Mythic rises from the ashes with $13M, new CEO

TechCrunch

Air Force through its Small Business Innovation Research (SBIR) program, focusing on computer vision for high-altitude drones and GPS signal acquisition. As PitchBook noted in a recent report , after years of shunning investments in military and security-related tech startups, VCs have begun raising their profile in the sector as the U.S.

article thumbnail

Why endpoint security will be a renewed priority for businesses of all sizes in 2023

CIO

A recent spate of high-profile security breaches at some of the largest enterprises in Australia has reminded everyone of the importance of security. Finally, AI-driven CPU threat monitoring has been designed to detect malware that has slipped past the anti-virus. Ongoing training of employees.

Malware 244