
AI in Cybercrime: Hackers Exploiting OpenAI
In a recent podcast interview with Cybercrime Magazine's host, Charlie Osborne, Heather Engel, Managing Partner at Strategic Cyber Partners, discusses reports from OpenAI that hackers are trying to use its tools for malicious purposes. The podcast can be listened to in its entirety below. ... Read More

How to Create a File Integrity Monitoring Strategy
Businesses of all sizes have strategies that apply to various aspects of their operations. From marketing to finance and from sales to hiring, strategies must be developed and implemented across departments ... Read More

Key Features to Look for in File Integrity Monitoring Software
An organization's IT infrastructure monitoring needs to provide alerts for unplanned downtime and network intrusion and secure the systems and data. To accomplish this, File Integrity Monitoring (FIM) can be implemented. Whether you're looking to add an FIM to secure your enterprise or switch FIM software, there are key features ... Read More

The 6 Most Common Network Vulnerabilities Haunting CSOs in 2024
Network security is significantly more challenging than it was several years ago. Today's IT teams struggle against a cybersecurity talent shortage, an increasing number of endpoints in their network, and the ever-changing cyber crime threat vector. As mentioned in Cimcor's 2023 Cybercrime Landscape Report, over 70% of breaches are now ... Read More

Disney Leak Reveals Financial and Strategy Secrets
In a recent podcast interview with Cybercrime Magazine's host, David Braue, Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, discusses a recent data breach affecting information from Disney, including a range of financial strategy details that shed light on the entertainment giant's operations. The ... Read More

Breaking Down the House’s New Artificial Intelligence Policy
In a groundbreaking move, the House Administration Committee, along with the Chief Administrative Officer (CAO) for the House of Representatives, have introduced a comprehensive policy aimed at governing the use of artificial intelligence (AI) within the lower chamber. This policy is a significant milestone designed to foster the secure and ... Read More

Defending Against Ransomware Threats: Tactics and Procedures Revealed by CISA
In a recent announcement, the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning about the increasing ransomware threat posed by Iran-based cyber actors. The advisory highlighted the specific tactics, techniques, and procedures employed by a group of threat actors associated with the Iranian government and an undisclosed IT company ... Read More

5 Ways to Reduce Information Security Risk in a Mobile Workplace
Today's talent is no longer bound by the cubicle. For many, home offices and Wi-Fi-enabled coffee shops are the new workplaces. One study shows that 41% of employees in North America alone work outside the office at least some of the time ... Read More

Defending Against Zero-Day Attacks: How CimTrak Foils CVE-2024-38213 Exploits
Zero-day vulnerabilities remain a significant threat to cybersecurity, particularly for enterprise environments. One of the latest and most concerning examples is CVE-2024-38213, nicknamed "Copy2Pwn." This vulnerability allows attackers to bypass the Windows Mark of the Web (MotW) security feature. By exploiting this flaw, malicious files can enter a system without ... Read More

Microsoft-CrowdStrike Outage Explained
In a recent podcast interview with Cybercrime Magazine's host, David Braue, Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, discusses the July 2024 CrowdStrike outage, explaining what happened and more. ... Read More