Offense Gets the Glory, but Defense Wins the Game

offense-gets-the-glory,-but-defense-wins-the-game

When it comes to cybercriminals, defense evasion remains the top tactic globally. In fact, it was the most employed tactic by malware developers in the past six months – and they’re often using system binary proxy execution to do so. Hiding malicious intentions is one of the most important actions for adversaries. Therefore, they are attempting to evade defenses by masking malicious intention and attempting to hide commands using a legitimate certificate.

read more

Deepfakes – Significant or Hyped Threat?

deepfakes-–-significant-or-hyped-threat?

Deepfakes

There have been many warnings of the rising cybersecurity threat from deepfakes, but little hard evidence that the threat is current. SecurityWeek spoke to Nasir Memon, an IEEE Fellow and NYU professor to understand the current state and future significance of deepfakes.

read more

How to Prepare for New SEC Cybersecurity Disclosure Requirements

how-to-prepare-for-new-sec-cybersecurity-disclosure-requirements

Many organizations used to hit the mute button whenever discussions about cybersecurity came up, but this silence has been breaking more frequently as more businesses are victimized by hackers and experience effects that hit their bottom line in ways that require them to share the information with regulators.

read more