cyberattacks

Modern Cyber Attacks: Understanding the Threats and Building Robust Defenses
Cyber attacks are more sophisticated than ever, from ransomware and phishing to DDoS attacks. This post explores these threats and provides actionable insights into building robust defenses. Learn how to implement security ...

Anatomy of an Attack | ADR vs WAF and EDR Technology | Contrast Security
In today's rapidly evolving cyber threat landscape, organizations face increasingly sophisticated attacks targeting their applications. Understanding these threats and the technologies designed to combat them is crucial. This article delves into the ...

Miggo Uncovers AWS Load Balancer Security Flaw
Miggio has discovered a configuration-based vulnerability that enables cybercriminals to bypass authentication and authorization services provided by the Application Load Balancer (ALB) from Amazon Web Services (AWS) that could affect more than ...

The Golden Age of Impersonation: The Dual Role of AI in Cyber Attacks & Cyber Defense
Attacks today can be executed through a myriad of communication channels, including emails, social media and mobile applications. ...

The Essential Guide to Evaluating Competitive Identity Verification Solutions
Amid customer and regulatory pressure and intensifying cyberattacks, organizations must ensure their identity verification strategies match up against AI-powered fraud techniques ...

How LLMs are Revolutionizing Data Loss Prevention
As data protection laws take hold across the world and the consequences of data loss become more severe, let’s take a closer look at the transformative potential that LLMs bring to the ...

Orca Security Extends Visibility Into the Cloud Security
Orca Security this week added an ability to classify cloud security threats in a way that enables security operations teams to better prioritize their remediation efforts ...

Cybersecurity Insights with Contrast CISO David Lindner | 8/2/24
Insight #1 Per IBM, the average cost of a data breach is now closing in on $5 million. You know what causes many of those breaches? Account compromise due to lack of ...

AI-Powered Cybersecurity: How Artificial Intelligence is Transforming the OSI Model
Explore the OSI model's 7 layers, their vulnerabilities in the cybersecurity landscape, and how AI is revolutionizing defense strategies for each layer ...

Cybersecurity Insights with Contrast CISO David Lindner | 7/26/24
Insight #1 A North Korean hacker, using a deep-faked identity, was hired by the U.S. cybersecurity firm KnowBe4. Shortly after receiving his workstation, the hacker used a virtual private network (VPN) and Raspberry Pi ...