article thumbnail

Most of 2023’s Top Exploited Vulnerabilities Were Zero-Days

Schneier on Security

Zero-day vulnerabilities are more commonly used , according to the Five Eyes: Key Findings In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them to conduct cyber operations against higher-priority targets.

article thumbnail

The Top 22 Security Predictions for 2022

Lohrman on Security

Here’s your annual roundup of the top security industry forecasts, trends and cybersecurity prediction reports for calendar year 2022. What will the New Year bring in cyber space?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Most Popular Cybersecurity Blog Posts from 2022

Lohrman on Security

What were the top government technology and security blogs in 2022? The metrics don’t lie, and they tell us what cybersecurity and technology infrastructure topics were most popular.

article thumbnail

2022 Midterm Election Cybersecurity: Are We Ready?

Lohrman on Security

As we head into the pivotal 2022 midterm elections this week, how prepared are states to ensure votes are properly counted and protected from cyber attacks? Here’s a roundup of recent developments.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

billion in 2022. Today’s technology leaders play a more strategic role in establishing cybersecurity strategy for their organizations. Software is complex, which makes threats to the software supply chain more real every day. In the U.S. alone, cyber losses totaled $10.3

article thumbnail

US Treasury Department sanctioned Chinese cybersecurity firm linked to Flax Typhoon APT

Security Affairs

Treasury Department sanctioned Chinese cybersecurity firm Integrity Tech for its involvement in attacks attributed to the Flax Typhoon group. Treasury sanctioned a Chinese cybersecurity firm, Integrity Tech, for links to cyberattacks by Chinas state-backed Flax Typhoon APT group (also called Ethereal Panda or RedJuliett).

article thumbnail

On the Cybersecurity Jobs Shortage

Schneier on Security

In April, Cybersecurity Ventures reported on extreme cybersecurity job shortage: Global cybersecurity job vacancies grew by 350 percent, from one million openings in 2013 to 3.5 million in 2021, according to Cybersecurity Ventures. The number of unfilled jobs leveled off in 2022, and remains at 3.5

article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

It’s mindboggling, but right now for 49% of respondents, cybersecurity is their primary business concern. March 17, 2022 at 9:30 am PDT, 12:30 pm EDT, 5:30 pm BST As a result, data protection needs to be a concern for most banks, businesses, and information technology specialists. DRaaS as the last line of defense.

article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert and Podcaster, will outline the interconnected relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.