article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Dunham Ken Dunham , Cyber Threat Director, Qualys Threat Research Unit Nation-state attacks and cloud compromises with long dwell times are rising as security lags behind post-Covid digital transformation. Vulnerabilities like data poisoning and prompt injection could have far-reaching impacts due to interconnected agents.

article thumbnail

Handling Pandemic-Scale Cyber Threats (preprint)

Adam Shostack

A new paper on 'Pandemic Scale Cyber Events Josiah Dykstra and I have a new pre-print at Arxiv, Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19. While the nature of these threats differs, the responses to COVID-19 illustrate valuable lessons that can guide preparation and response to cyber events.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is Cyber Threat Hunting? (Definition & How it Works)

Tech Republic Security

Cyber threat hunting is the proactive process of searching for and detecting potential threats or malicious activities within a network or system.

article thumbnail

2022 cyber threat report details growing trends

Tech Republic Security

The post 2022 cyber threat report details growing trends appeared first on TechRepublic. SonicWall’s mid-year report update has been released with new information on malware, ransomware, cryptojacking and more.

article thumbnail

The March Madness Cyber Threat

Adam Levin

The post The March Madness Cyber Threat appeared first on Adam Levin. Abandoned or inactive email accounts within an organization provide an easy way into workplace emails for hackers, because unusual activity will go unnoticed. Delete or archive employee emails when they leave the company. .

article thumbnail

Navigating the Cyber Threat Landscape: Lessons Learned & What’s Ahead

Tech Republic Security

A look at the cyber threat landscape of 2024, including major breaches and trends. An expert weighs in on key lessons and what to expect in 2025.

article thumbnail

Space Systems and IoT: What Are the Biggest Cyber Threats?

Lohrman on Security

In this interview with Dick Wilkinson, CTO at Proof Labs, we explore the cyber threats in space and on the Internet of Things, and how they impact each of us.