Source
DARKReading
Has the role of chief privacy officer become something more than it was? And is it still a role that just one person can handle?
A MOIS-aligned threat group has been using Microsoft Exchange servers to exfiltrate sensitive data from Gulf-state government agencies.
But the time when quantum computers pose a tangible threat to modern encryption is likely still several years away.
By using EDRSilencer, threat actors are able to prevent security alerts and reports getting generated.
The shift to a distributed work model has exposed organizations to new threats, and a low but continuing stream of printer-related vulnerabilities isn't helping.
Challenges with cybercrime prosecution are making it easier for attackers to act with impunity. Law enforcement needs to catch up.
As in golf, security requires collaboration across the entire organization, from individual contributors in each department to the executive level and the board.
The long-active, India-sponsored cyber-threat group targeted multiple entities across Asia, Africa, the Middle East, and even Europe in a recent attack wave that demonstrated the use of a previously unknown post-exploit tool called StealerBot.