Deepfake videos that are indistinguishable from authentic videos are coming, and we can scarcely imagine what they'll be used for. We should start preparing for the worst.
Security researchers spotted a new attack campaign that's targeting organizations in several countries with a new variant of Qbot banking malware.
A new reverse proxy tool called Modlishka can easily automate phishing attacks and bypass two-factor authentication (2FA) — and it's available for download on GitHub.
University of Maryland researchers warn that with limited resources, threat actors could launch a successful cyberattack on Google's bot-detecting reCaptcha service.
By combining repeatable processes for threat hunting with intelligent solutions and skilled analysts, organizations can improve threat response and protect their most critical assets.
During the recent IBM Resilient year-end webinar, expert panelists discussed and debated the trends that defined 2018 and offered cybersecurity predictions on what the industry can expect in 2019.
A robust, documented incident response plan is the foundation of a successful automation and orchestration program — but where do you begin?
The main characteristics of a SIEM leader are centered around innovation in early threat detection, adaptation to customer environments and strong market presence.
Analysts discovered a new spear phishing attack campaign from the SNAKEMACKEREL group that uses fake Brexit-related documents to infiltrate major government agencies and steal information.
IT automation is the future of security programs, but it's not simply plug-and-play. SOC leaders must implement this technology thoughtfully to unlock the full range of benefits.