Why it’s time for phishing prevention to move beyond email
Summary: Despite significant investments in email security solutions, phishing attacks continue to pose a severe threat to organizations, largely due to the emergence of sophisticated Attack-in-the-Middle (AitM) phishing techniques. Traditional detection methods, including known-bad blocklists and malicious webpage detection, are increasingly ineffective against these evolving tactics.…
Read More
How to Steer AI Adoption: A CISO Guide
Summary: Chief Information Security Officers (CISOs) are increasingly engaged with AI teams, but they lack resources to define their roles effectively. The CLEAR framework provides security leaders with a strategic approach to support AI adoption through asset inventory, proactive learning, policy enforcement, application of use cases, and leveraging existing frameworks.…
Read More

Summary: Security researchers have identified the largest publicly known ransomware payment of $75 million made to the Dark Angels group, highlighting a significant increase in ransomware attacks and the potential for other threat actors to mimic their tactics. The report emphasizes the need for organizations to adopt robust security measures to combat the evolving ransomware landscape.…

Read More

Summary: The content discusses the slow adoption of generative AI in enterprises due to concerns about data privacy and compliance.

Threat Actor: N/A Victim: N/A

Key Point :

Enterprises have been slow to adopt generative AI due to concerns about data privacy and compliance. A recent survey showed that while 75% of enterprises tested GenAI last year, only 9% deployed it widely.…
Read More

Summary: The content discusses the prevalence of account takeover attacks and their impact on organizations, based on a survey conducted by Abnormal Security.

Threat Actor: Account takeover attacks

Victim: Organizations

Key Point:

83% of organizations experienced at least one account takeover in the past year. 77% of security leaders rank account takeover attacks among their top four cyber-threats.…
Read More

Being a CISO is a balancing act: ensuring organizations are secure without compromising users’ productivity. This requires taking multiple elements into consideration, like cost, complexity, performance and user experience. CISOs around the globe use Cato SSE 360, as part of the Cato SASE Cloud platform to balance these factors without compromise.…

Read More

Mar 11, 2024The Hacker NewsCybersecurity / Browser Security

As the shift of IT infrastructure to cloud-based solutions celebrates its 10-year anniversary, it becomes clear that traditional on-premises approaches to data security are becoming obsolete. Rather than protecting the endpoint, DLP solutions need to refocus their efforts to where corporate data resides – in the browser.…

Read More

Mar 04, 2024The Hacker NewsSaaS Security / Vulnerability Assessment

A company’s lifecycle stage, size, and state have a significant impact on its security needs, policies, and priorities. This is particularly true for modern mid-market companies that are either experiencing or have experienced rapid growth. As requirements and tasks continue to accumulate and malicious actors remain active around the clock, budgets are often stagnant at best.…

Read More