Even Great Companies Get Breached — Find Out Why and How to Stop It

Dec 17, 2024The Hacker NewsWebinar / Risk Management Even the best companies with the most advanced tools can still get hacked. It’s a frustrating reality: you’ve invested in the right solutions, trained your team, and strengthened your defenses. But breaches still happen. So, what’s going wrong? The truth is, that attackers are constantly finding new […]

Is That Letter Real? Here’s How To Tell

Equifax has agreed to a settlement with the FTC stemming from a September 2017 data breach. SOPA Images/LightRocket via Getty Images If you’ve recently received a notification about the Equifax data breach settlement, you may be wondering if it’s real or just another scam. With scammers often exploiting high-profile settlements, it’s crucial to verify whether […]

How Hybrid Password Attacks Work and How to Defend Against Them

Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods to steal user credentials. Hybrid password attacks merge multiple cracking techniques to amplify their effectiveness. These combined approaches exploit the strengths of various methods, accelerating the password-cracking process. In this post, we’ll explore hybrid attacks — what they are and the most common […]

How to Plan and Prepare for Penetration Testing

As security technology and threat awareness among organizations improves so do the adversaries who are adopting and relying on new techniques to maximize speed and impact while evading detection. Ransomware and malware continue to be the method of choice by big game hunting (BGH) cyber criminals, and the increased use of hands-on or “interactive intrusion” […]

Expert Tips on How to Spot a Phishing Link

Phishing attacks are becoming more advanced and harder to detect, but there are still telltale signs that can help you spot them before it’s too late. See these key indicators that security experts use to identify phishing links: 1. Check Suspicious URLs Phishing URLs are often long, confusing, or filled with random characters. Attackers use […]

How to Investigate ChatGPT activity in Google Workspace

Sep 17, 2024The Hacker NewsGenAI Security / SaaS Security When you connect your organization’s Google Drive account to ChatGPT, you grant ChatGPT extensive permissions for not only your personal files, but resources across your entire shared drive. As you might imagine, this introduces an array of cybersecurity challenges. This post outlines how to see ChatGPT […]

Next-Generation Attacks, Same Targets – How to Protect Your Users’ Identities

Sep 02, 2024The Hacker NewsCybercrime / CISO Insights The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware Note: on August 29, the FBI and CISA issued a joint advisory as part of their ongoing #StopRansomware effort to help organizations protect against ransomware. The latest advisory, AA24-242A, describes a new […]

How to Turn Developers into Security Champions

Jul 18, 2024The Hacker NewsApp Security / Security Awareness Let’s face it: AppSec and developers often feel like they’re on opposing teams. You’re battling endless vulnerabilities while they just want to ship code. Sound familiar? It’s a common challenge, but there is a solution. Ever wish they proactively cared about security? The answer lies in […]

Here’s how to find out if your data was stolen in AT&T’s massive hack

If you’re one of AT&T’s cellular customers, you can check your account to see if your data was compromised as part of the massive breach the telecom giant announced on Friday.  If you were an AT&T customer between May 1, 2022 to Oct. 31, 2022, it’s likely your data was involved, given that the company […]