Cybercriminals launched “Leaksmas” event in the Dark Web exposing massive volumes of leaked PII and compromised data
Leaksmas: On Christmas Eve, multiple threat actors released substantial data leaks, Resecurity experts reported. On Christmas Eve, Resecurity protecting Fortune
Lockbit ransomware attack interrupted medical emergencies gang at a German hospital network
A Lockbit ransomware attack against the German hospital network Katholische Hospitalvereinigung Ostwestfalen (KHO) caused service disruptions at three hospitals. German
Mastering the dynamic SaaS ecosystem and staying ahead in 2024
I’m the co-founder and CTO of Atmosec, which is now under the Check Point umbrella. I’m driven by helping companies confidently secure the adoption, usage and management of any business application across their organization. In this interview, gain valuable insights from SaaS security expert Misha Seltzer as he explores the dynamic landscape of today’s SaaS ecosystem. […]
The post Mastering the dynamic SaaS ecosystem and staying ahead in 2024 appeared first on CyberTalk.
APT28 Adversary Activity Detection: New Phishing Attacks Targeting Ukrainian and Polish Organizations

Throughout the second half of December 2023, cybersecurity researchers uncovered a series of phishing attacks against Ukrainian government agencies and Polish organizations attributed to the infamous russian nation-backed APT28 hacking collective. CERT-UA has recently issued a heads-up covering the in-depth overview of the latest APT28 attacks, from the initial compromise to posing a threat to […]
The post APT28 Adversary Activity Detection: New Phishing Attacks Targeting Ukrainian and Polish Organizations appeared first on SOC Prime.
AI and Lossy Bottlenecks
Artificial intelligence is poised to upend much of society, removing human limitations inherent in many systems. One such limitation is
Experts warn of critical Zero-Day in Apache OfBiz
Experts warn of a zero-day flaw that affects Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system. Experts warn of
What is HSM? An Introduction to Hardware Security Module
This piece aims to offer a thorough understanding of HSM (Hardware Security Modules) and explain their role in safeguarding sensitive
Xamalicious Android malware distributed through the Play Store
Researchers discovered a new Android malware dubbed Xamalicious that can take full control of the device and perform fraudulent actions.
10 top cybersecurity books that should be on your bookshelf
EXECUTIVE SUMMARY: In an age of digital everything, do you even use a bookshelf anymore? Whether you read physical books, live on Kindle or are an Audible addict, our curated list of must-reads is designed to help you stay at the forefront of innovation and incorporate the best insights into your organization. We’re excited to […]
The post 10 top cybersecurity books that should be on your bookshelf appeared first on CyberTalk.