Diana Kelley returns to the show to discuss her work as a board member of the Cyber Future Foundation and the goings-on at this year’s Cyber Talent Week. Whether you’re…
Posts Written ByThreatRavens
Ethical user data collection and machine learning | Cyber Work Podcast
Today on Cyber Work Ché Wijesinghe of Cape Privacy talks about the safe and ethical collection of user data when creating machine learning or predictive models. When your bank is…
Working as a privacy manager | Cybersecurity Career Series
A Privacy Manager is responsible for the development, creation, maintenance and enforcement of the privacy policies and procedures of an organization. They ensure compliance with all privacy-related laws and regulations.…
Malicious Reconnaissance: What It Is and How To Stop It
You spend your days getting ready to stop threat actors. But even as you wonder, attackers could already be ‘casing the joint’. Before any well-organized attack, skillful or professional attackers…
ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups
IBM Security X-Force researchers have continually analyzed the use of several crypters developed by the cybercriminal group ITG23, also known as Wizard Spider, DEV-0193, or simply the “Trickbot Group”. The…
Evaluation of cyber activities and the threat landscape in Ukraine
With this article, our core aim is to share a threat landscape overview, which Kaspersky cybersecurity researchers are observing in relation to the conflict, with the wider international community and thus to contribute to broader ongoing cyber-stability discussions of threat-related insights.
How Dangerous Is the Cyber Attack Risk to Transportation?
If an attacker breaches a transit agency’s systems, the impact could reach far beyond server downtime or leaked emails. Imagine an attack against a transportation authority that manages train and…
Avoiding the Unintended Consequences of Strict Cybersecurity Policies
Does the left hand know what the right hand is doing? Or does even the left pinky know what the left ring finger is doing? Problems can easily arise when…
HTML attachments in phishing e-mails
In this article we review phishing HTML attachments, explaining common tricks the attackers use, and give statistics on HTML attachments detected by Kaspersky solutions.
What does a cybersecurity beginner do? | Cybersecurity Career Series
Just getting started? This role is for you! The Cybersecurity Beginner role focuses on the foundational skills and knowledge that will allow anyone to take the first step towards transitioning…