article thumbnail

Report Reveals Top Cyber Threats, Trends of 2023 First Half

SecureWorld News

Critical Start today released its biannual Cyber Intelligence Report, featuring the top threats observed in the first half of 2023 and emerging cybersecurity trends impacting the healthcare, financial services, and state and local government industries. The new Beep malware is top of mind for organizations and individuals.

Trends 74
article thumbnail

Information Stealing Malware on the Rise, Uptycs Study Shows

SecureWorld News

A new study from Uptycs has uncovered an increase in the distribution of information stealing malware. Incidents have more than doubled in Q1 2023, indicating a disturbing trend that threatens global organizations. Examining the dark web reveals that infostealer malware has become increasingly widespread.

Malware 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Raspberry Robin malware is the danger lurking inside your USB

Dataconomy

Malware continues to plague organizations and individuals alike and one of the more insidious strains in recent times is the Raspberry Robin malware. Malware – malicious software crafted with harmful intent – acts as their weapon of choice.

Malware 41
article thumbnail

Report: Attackers Move Lightning Fast to Capitalize on  Vulnerabilities

SecureWorld News

This morning, the Qualys Threat Research Unit released its 2023 Threat Landscape Year in Review report. In 2023, the Qualys Threat Research Unit (TRU) witnessed a critical trend in exploiting high-risk vulnerabilities. The mean time to exploit vulnerabilities in 2023 stands at approximately 44 days (about one-and-a-half months).

Report 82
article thumbnail

Why endpoint security will be a renewed priority for businesses of all sizes in 2023

CIO Business Intelligence

Three of the biggest risks moving into 2023 and beyond are: Ransomware – in which a malicious program infects a computer, locking access to all files until a ransom is paid to gain access to an unlock key. Organisations can run virtual machines for security-based isolation with application compatibility, across different operating systems.

article thumbnail

Google confirms: CVE-2023-5129 exposes WebP’s achilles’ heel

Dataconomy

CVE-2023-5129 initially appeared as a blip on the security radar, but as Google dug deeper, it turned out to be a critical threat, a security flaw affecting the Libwebp library, versions 0.5.0 CVE-2023-5129 is a critical thread At the heart of CVE-2023-5129 is a fundamental problem: a faulty implementation of the Huffman coding algorithm.

Google 41
article thumbnail

Securing 5G for 2023 and beyond

CIO Business Intelligence

We must secure up to and including Layer 7 (the application layer) to ensure that business continues on in this 24/7 environment. Application and service threats: There are also risks from specific threats for applications and services. 5G is designed to go places. Security needs to keep up. trillion by 2030.1 Radio rogues.

Security 122