Palo Alto Networks' Unit 42 says that in the cases it worked, the average demand was up 144% and average payment was up 78%.| CyberScoop
Amid questions about the most recent cyberattacks on Ukraine a known adversary has been observed launching its own attacks.| CyberScoop
Ransomware groups last year achieved lateral movement within an average of 48 minutes after gaining initial access to targeted environments, threat intelligence experts said.| CyberScoop
Palo Alto Networks’ threat intelligence firm said nearly 9 in 10 cyberattacks it responded to last year involved disrupted business operations.| CyberScoop
The latest smishing scam follows a familiar process as ones the industry has seen over the past decade.| CyberScoop
The network security device vendor is making a regular appearance on CISA’s known exploited vulnerabilities catalog. Unlike its competitors, SonicWall hasn’t signed the secure-by-design pledge.| CyberScoop
Top security leaders at some of the largest tech and cybersecurity vendors said public-private collaborative work continues, despite budget cuts and personnel changes.| CyberScoop
Mandiant said exploits were the most common initial access vector last year, linking software defects to 1 in 3 attacks. The most commonly exploited vulnerabilities affected network edge devices.| CyberScoop
Exploited vulnerabilities have turned up in Ivanti products 16 times since 2024. That’s more than any other vendor in the network edge device space.| CyberScoop
AWS, Microsoft Azure and Google Cloud Platform each scored 0% security effectiveness in CyberRatings.org’s evaluation of cloud network firewall vendors’ ability to prevent exploits and evasions.| CyberScoop
A set of ICONICS SCADA software systems used in critical infrastructure around the world suffered from at least five known vulnerabilities.| CyberScoop
Wild variances in naming taxonomies aren’t going away, but a new initiative from the security vendors aims to more publicly address obvious overlap in threat group attribution.| CyberScoop
The 24 people who signed the letter endorsing Sean Cairncross include former government officials and current industry leaders.| CyberScoop
The yearslong scheme goes much deeper than contract work, extending to roles beyond traditional IT and sometimes granting the insider threat “keys to the kingdom,” DTEX President Mohan Koo said.| CyberScoop