
Apple
AppleThreat Actors Increasingly Target macOS, Report Finds
A new report from cyber threat intelligence company Intel471 reveals that threat actors are infiltrating macOS.
Cedric Pernet is a senior threat expert with a strong focus on cybercrime and cyberespionage. He currently works at Trend Micro. Prior to that position, he worked for several Computer Emergency Response Teams (CERTs) where he did threat intelligence investigations, incident response, and computer forensics. He was also a Law Enforcement Officer working on Cybercrime in France. He is the author of a paperbook in French language on cyberespionage and an influential person in the cybersecurity community.
EducationNetwork communications
Personal QuoteBruce Schneier - "If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology."
A new report from cyber threat intelligence company Intel471 reveals that threat actors are infiltrating macOS.
Read more about a China-aligned cyberespionage threat actor dubbed StormBamboo, also known as Evasive Panda, which compromised an Internet Service Provider and infected targets with malware.
Penetration testing is one of the best ways to proactively protect a cloud system. Read below to learn how it works and why it’s important in a cloud environment.
Cisco Talos observed the TTPs used by 14 of the most prevalent ransomware groups based on their volume of attack, impact to customers and atypical behavior.
A threat actor exploited the Snowflake platform to target organizations for data theft and extortion using compromised credentials. Learn how to protect your business from this threat.
Find out how the cyberespionage threat actor LilacSquid operates, and then learn how to protect your business from this security risk.
This new report also indicates an increasing attack surface as putting pressure on CISOs. One positive note is CISOs' improving relationships with board members.
Find out how Grandoreiro banking trojan campaigns work and the countries targeted, as well as how to mitigate this malware threat.
Read about Black Basta ransomware’s impact and how to mitigate it. Plus, learn about recent ransomware trends.
Read about a supply chain attack that involves XZ Utils, a data compressor widely used in Linux systems, and learn how to protect from this threat.