What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in Cybersecurity

Mandiant Report: Snowflake Users Targeted for Data Theft and Extortion

A new report from Mandiant, part of Google Cloud, reveals that a financially motivated threat actor named UNC5537 collected and exfiltrated data from about 165 organizations’ Snowflake customer instances. Snowflake is a cloud data platform used for storing and analyzing large volumes of data. The threat actor managed to get . . . Read more

Downtime Costs World’s Largest Companies $400 Billion a Year, According to Splunk Report

Unplanned downtime is costing the world’s largest companies $400 billion a year, or roughly 9% of their profits, a new report has found. This is the equivalent of about $9,000 lost for every minute of system failure or service degradation. The report, published by the data management platform Splunk, also . . . Read more

Downtime Costs World’s Largest Companies $400 Billion a Year, According to Splunk Report

Unplanned downtime is costing the world’s largest companies $400 billion a year, or roughly 9% of their profits, a new report has found. This is the equivalent of about $9,000 lost for every minute of system failure or service degradation. The report, published by the data management platform Splunk, also . . . Read more

OpenAI, Anthropic Research Reveals More About How LLMs Affect Security and Bias

Because large language models operate using neuron-like structures that may link many different concepts and modalities together, it can be difficult for AI developers to adjust their models to change the models’ behavior. If you don’t know what neurons connect what concepts, you won’t know which neurons to change. On . . . Read more

Cisco Talos: LilacSquid Threat Actor Targets Multiple Sectors Worldwide With PurpleInk Malware

A new report from Cisco Talos exposed the activities of a threat actor known as LilacSquid, or UAT-4820. The threat actor exploits vulnerable web applications or uses compromised Remote Desktop Protection credentials to successfully compromise systems by infecting them with custom PurpleInk malware. So far, organizations in various sectors in . . . Read more

Proofpoint’s CISO 2024 Report: Top Challenges Include Human Error & Risk

In Proofpoint’s 2024 Voice of the CISO report, the cybersecurity company found that CISOs are dealing with people-centric threats more than ever. Plus, cybersecurity budgets often don’t change, and AI can help and hurt CISOs’ efforts. Regarding the specific threat risks, 41% of the CISOs mostly fear ransomware attacks, followed . . . Read more

What Is ShrinkLocker? New Ransomware Targets Microsoft BitLocker Encryption Feature

A new strain of ransomware dubbed ShrinkLocker is being used by cyberattackers to target enterprise computers. It exploits the Microsoft BitLocker encryption feature to encrypt the entire local drive and remove the recovery options before shutting down the PC. ShrinkLocker was discovered by cybersecurity firm Kaspersky, and analysts have observed . . . Read more

Will Australia Ever Dig Itself Out of the Cybersecurity Skills Shortage?

Australia continues to grapple with the ramifications of a massive cyber security skills shortage, underscored by another recent large-scale data breach. The big concern is whether the nation even has the resources to strengthen resilience. Recently, the electronic prescription company MediSecure fell victim to a major ransomware attack. Together with other . . . Read more

Get 9 Courses on Ethical Hacking for Just $50

TL;DR: Kickstart a lucrative ethical hacking career or protect your own business with The Complete 2024 Penetration Testing & Ethical Hacking Certification Training Bundle, now just $49.99. Ethical hackers are in high demand all over the world, in all kinds of industries. If you’re interested in pursuing this promising career . . . Read more

Anthropic’s Generative AI Research Reveals More About How LLMs Affect Security and Bias

Because large language models operate using neuron-like structures that may link many different concepts and modalities together, it can be difficult for AI developers to adjust their models to change the models’ behavior. If you don’t know what neurons connect what concepts, you won’t know which neurons to change. On . . . Read more