article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Acohido to share his ideas about the current cyber threat landscape, the biggest threats for businesses today, the role of AI and machine learning in cyberattacks and cyberdefence, and the most effective methods for companies to protect themselves. Erin: What are some of the biggest cyber threats that businesses face today?

article thumbnail

Increasing Your Business’s Cyber Threat Intelligence

SiteLock

Winning the ongoing battle against cybercrime and criminals starts with understanding the nature of the threats and how to combat them. How high is your business’ cyber threat intelligence ? What is Cyber Threat Intelligence? Business Threat Statistics You Should Know. Independent vendor research.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity in the Evolving Threat Landscape

Security Affairs

However, while companies struggle to stay ahead of emerging threats, there are several tools and approaches they can adopt to bolster their cybersecurity strategies. A Dynamic, Complex Threat Landscape Today’s cyber threat landscape is characterized by its dynamic and complex nature.

article thumbnail

AI: The New Buzzword in Cybersecurity

SecureWorld News

Here's what it cranked out (unedited): "AI has the potential to be a powerful tool for cybersecurity, as well as a potential threat to security. Here are some possibilities, concerns, risks, and opportunities of AI in relation to cybersecurity: Possibilities: AI can help identify and prevent cyber threats in real-time.

article thumbnail

Top 5 Cyber Attack news headlines trending on Google

CyberSecurity Insiders

Chinese intelligence-backed hacking group APT41 has given a hint that its hackers were behind the cyberattacks launched on Air India and SITA-the IT and Telecom solutions provider to the air travel industry. And as hackers failed to gain any financial gain from the hack, they decided to sell that data via various hacking forums.

article thumbnail

GUEST ESSAY: How stealth, persistence allowed Wipro attacker to plunder supply chain

The Last Watchdog

Related: Marriott suffers massive breach We now know, thanks to reporting from cybersecurity blogger Brian Krebs, that the Wipro hack was a multi-month intrusion and likely the work of a nation-state backed threat actor. Unfortunately, at the moment there is no generic defense a vendor can sell a company to stop this type of threat.

article thumbnail

Microsoft Defender uses Intel TDT technology against crypto-mining malware

Security Affairs

Microsoft announced an improvement of its Defender antivirus that will leverage Intel’s Threat Detection Technology (TDT) to detect processes associated with crypto-miners. SecurityAffairs – hacking, Microsoft Defender). ” reads the announcement published by Microsoft. Pierluigi Paganini.