AI
AI

Cybersecurity

The Rising Tide of Intrusions: Increased Stolen Credentials and Perimeter Exploits Amid Declining Phishing Attacks

Photo credit: www.csoonline.com The landscape of cybersecurity continues to evolve, with several malware programs emerging as significant threats. Among these, GootLoader has gained attention as...

Ransomware Attack on Hitachi Vantara | CSO Online

Photo credit: www.csoonline.com Hitachi Vantara Victimized by Akira Ransomware Attack TY Lim | shutterstock.com Hitachi Vantara has confirmed a ransomware attack that occurred on April 26, leading...

Cisco Implements AI-Powered Security Automation for Enterprise Networks

Photo credit: www.networkworld.com Advancements in Cybersecurity Automation with XDR and SOAR In a recent blog post, Shipley emphasized the transformative nature...

IBM Pursues Autonomous Security Operations

Photo credit: www.networkworld.com IBM is enhancing its cybersecurity measures through proactive threat hunting, which adds a layer to conventional security...

AI Takes Center Stage at the RSA Conference

Photo credit: www.csoonline.com In 2024, San Francisco has become a hub for cybersecurity innovation, attracting over 41,000 delegates and approximately...

Is Secure by Design at CISA Finished? Will the Private Sector Honor Its Commitment?

Photo credit: www.csoonline.com Ahead of their discussion on Secure by Design at RSAC 2025, CSO engaged with Jason Healey, a...

RSA Conference 2025: Updates and Insights

Photo credit: www.csoonline.com The RSA 2025 Conference is returning to San Francisco, offering a comprehensive platform for discussions on the...

Huntress Enhances ITDR Features to Tackle Credential Theft and BEC

Photo credit: www.csoonline.com Huntress Enhances SIEM with New Integrations Huntress has announced significant updates to its Security Information and Event Management...