#threat-mitigation

[ follow ]
Information security
fromSecurityWeek
4 days ago

The Mythos Moment: Enterprises Must Fight Agents with Agents

Agentic AI poses significant cyber risks by autonomously identifying and exploiting software vulnerabilities, necessitating advanced defensive measures.
fromInfoWorld
2 months ago

Microsoft warns of jobthemed repo lures targeting developers with multistage backdoors

Multiple repositories followed repeatable naming conventions and project 'family' patterns, enabling targeted searches for additional related repositories that were not directly referenced in observed telemetry but exhibited the same execution and staging behavior.
Information security
fromFast Company
8 months ago

'How do we protect our people?'

Safety design experts say that preventative techniques work best. Threat mitigation should begin with the building design process, says Peggy Phillips, who leads engineering consulting firm Thornton Tomasetti's Protective Design and Security practice.
US politics
fromSecuritymagazine
9 months ago

Threat Actor Targeting Indian Defense Sector

APT36's focus on Linux-specific systems, particularly those used in government infrastructure, reinforces that no operating system is off-limits to nation-state attackers. This kind of multi-layered phishing attack highlights how threat actors are constantly evolving their tactics to quietly bypass defenses and exploit user trust.
Privacy professionals
#cybersecurity
[ Load more ]