News & Updates

Businesses detect cyberattacks faster despite increasingly sophisticated adversaries

Global organizations are improving their attack detection capabilities despite facing increasingly sophisticated, persistent, and creative adversaries. The Mandiant M-Trends 2023 report, now in its fourteenth year, revealed that the global median dwell time – calculated as the median number of days an attacker is present in a target’s environment before detection – dropped to 16 days in 2022. This is the shortest median global dwell time from all M-Trends reporting periods.

The reduction in median dwell time reflects the key role partnerships and the exchange of information play in building a more resilient cybersecurity ecosystem, according to Mandiant. That said, several findings from this year’s report demonstrate that adversaries are progressively more sophisticated, persistent, and confident, as evidenced by hundreds of new malware families, extensive cyber espionage campaigns by nation-state-backed actors, and novel aggressive, personal tactics that ignore the traditional cyber rules of engagement.

To read this article in full, please click here

News & Updates

YouTube Videos Distributing Aurora Stealer Malware via Highly Evasive Loader

Cybersecurity researchers have detailed the inner workings of a highly evasive loader named “in2al5d p3in4er” (read: invalid printer) that’s used to deliver the Aurora information stealer malware.
“The in2al5d p3in4er loader is compiled with Embarcadero RAD Studio and targets endpoint workstations using advanced anti-VM (virtual machine) technique,” cybersecurity firm Morphisec said in a report
News & Updates

Army helicopter crash blamed on skipped software patch

The emergency ditching of an Australian military helicopter in the water just
off a beach in New South Wales, has been blamed on the failure to apply a
software patch.

At approximately 9pm on March 23, a MRH-90 Taipan helicopter operated by the
Australian army ditched into Jervis Bay
[https://www.theguardian.com/australia-news/2023/mar/23/ten-soldiers-plucked-from-sea-after-army-helicopter-crash-near-jervis-bay]
, during what should have been a routine counter-terrorism training operation.

Tha

Cybersecurity Tools

Voice Cloning is Becoming a Ransom Threat

Voice impersonation, also known as voice cloning, are becoming an increasingly prevalent threat in the digital landscape. Sophisticated artificial intelligence (AI) technologies can now imitate voices with remarkable accuracy, leading to threats against our privacy and security.
Scroll to Top