Threat

Is Cyber Threat Intelligence Worthless?
I was recently asked “What do intelligence reports do? They appear worthless!” I found the question both funny and ironic. Unfortunately, I had to gently deliver some uncomfortable news. There is ...

Gartner report: How SBOMs improve security and compliance in the software supply chain
As software supply chain risks rise, regulatory authorities are increasingly requiring organizations to adopt software bills of materials (SBOMs) for security and compliance ...

Gartner Report: How to Respond to the Threat Landscape in a Volatile, Complex and Ambiguous World
Refine your cybersecurity strategies to navigate the challenges of a VUCA (volatility, uncertainty, complexity, and ambiguity) environment ...

Application Detection and Response (ADR): A Game-changing SOC Analyst Tool | Contrast Security
Paged at 3 a.m. again … we had another breach to respond to in the security operations center (SOC). While the incident response team was busy delegating roles and responsibilities, I was ...

Spooky Spam, Scary Scams: Halloween Threats Rise
Halloween-themed spam has risen sharply this season, with Bitdefender reporting that 40% of these emails contain malicious content designed to scam users or harvest personal data. In the first half of October ...

Security Professionals Cite AI as Top Security Risk
Artificial intelligence (AI) is emerging as a top concern in the cybersecurity world, with 48% of respondents identifying it as the most significant security risk facing their organizations, according to a HackerOne ...

Email Security Breaches Rampant Among Critical Infrastructure Organizations
A full 80% of organizations within the critical infrastructure vertical experienced email-related security breaches in the past year, according to an OPSWAT survey ...

Email Attacks Surge, Ransomware Threat Remains Elevated
There has been a dramatic rise in email attacks and ransomware incidents, with an Acronis report noting a staggering 293% increase in email attacks in the first half of 2024 compared to ...

Eliminating Information Asymmetry in the Attack Chain With GenAI
Appdome Eliminating Information Asymmetry in the Attack Chain With GenAI In the rapidly evolving landscape of mobile security, staying ahead of attackers requires more than robust defense mechanisms. It demands a comprehensive ...

Google Cloud Security Threat Horizons Report #10 Is Out!
This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our next Threat Horizons Report (full version) that we just released (the official blog for ...