Report: 40% of Environments Exposed to Full Take Over

The Blue Report 2024 highlights alarming findings, with 40% of environments vulnerable to total takeover, emphasizing the importance of cybersecurity. Prevention effectiveness has improved to 69%, but detection effectiveness has dropped to 12%.

New Specula Tool Uses Outlook for Remote Code Execution in Windows

TrustedSec released a post-exploitation framework called "Specula", which exploits CVE-2017-11774 to create a custom Outlook Home Page using WebView and execute arbitrary commands on compromised Windows systems.

IBM: Cost of a Breach Reaches Nearly $5 Million, With Healthcare Being Hit the Hardest

Breaches impacted 17 industries across 16 countries and regions, with costs related to detecting breaches, notifying victims, post-breach response efforts, and lost business.

Report: Russian Ransomware Gangs Account for 69% of all Ransom Proceeds

According to an analysis by TRM Labs, Russian-speaking threat actors were responsible for over 69% of all ransomware-related cryptocurrency earnings in the past year, amounting to more than $500 million.

Despite Bans, AI Code Generation Tools Widely Used in Organizations

Despite bans, organizations are widespread in using AI code tools, causing security concerns, as reported by Checkmarx. While 15% prohibit AI tools for code generation, a staggering 99% still use them.

National Vulnerability Backlog Could Surge to 30,000 by 2025

The National Vulnerability Database (NVD), maintained by the National Institute of Standards and Technology (NIST), currently has a backlog of over 16,000 vulnerabilities, with an average daily influx of more than 100 new security flaws.

AI-Generated Deepfake Attacks Force Companies To Reassess Cybersecurity

Companies are reevaluating their cybersecurity defenses in response to the rise of AI-generated deepfake attacks and identity fraud. According to GetApp, 73% of US organizations have already developed deepfake response plans.

Most CISOs Feel Unprepared for New Compliance Regulations

Most CISOs are feeling unprepared for new compliance regulations, such as the SEC’s cybersecurity disclosure rules in the USA and the Digital Operational Resilience Act (DORA) in the EU, presenting a significant challenge.

Scam Attacks Taking Advantage of the Popularity of the Generative AI Wave

GenAI-related domains are being registered daily with suspicious activity, including those linked to malware like ransomware and phishing. The trend in GenAI-related domain registrations mirrors industry milestones.

Report: 95% of Organizations Face Severe Software Supply Chain Risk

OSC&R report reveals that 95% organizations face high software supply chain risks. Despite advancements in application security programs, more work is needed to manage risks effectively.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags