Skip to content
Saturday, August 30, 2025
The TechBriefs
  • Home
  • Technology
  • AI
  • Computers
  • Security
  • Internet
  • Press Releases
    • GlobeNewswire
    • PRNewswire
  • Contact

Tag: cyberattacks

  • Home
  • cyberattacks
Concealing cyberattacks risks penalties and harms trust
  • Article
  • compliance
  • cyberattacks
  • cybersecurity
  • data breaches
  • Technology

Concealing cyberattacks risks penalties and harms trust

  • 0

Last month Bitdefender revealed that 70 percent of UK CISO have faced pressure to conceal security incidents, cyberattacks and breaches. […]

DDoS attacks dominate threats to critical infrastructure
  • Article
  • cyberattacks
  • cybersecurity
  • DDoS
  • hacktivism
  • infrastructure
  • Technology

DDoS attacks dominate threats to critical infrastructure

  • 0

New research from NETSCOUT looking at the DDoS attack landscape shows that this method has evolved into a precision-guided weapon […]

Malicious URLs overtake attachments as top email threat
  • Article
  • cyberattacks
  • cybersecurity
  • Email
  • Malware
  • Phishing
  • Technology

Malicious URLs overtake attachments as top email threat

  • 0

Cybercriminals increasingly favor malicious URLs over attachments, as they are easier to disguise and more likely to evade detection, according […]

Threat actors move to smaller more persistent attacks
  • Article
  • bots
  • cyberattacks
  • cybersecurity
  • DDoS
  • hacktivism
  • Technology
  • threat

Threat actors move to smaller more persistent attacks

  • 0

Threat actors are favoring smaller, persistent attacks under 100,000 requests per second according to a new report. This shift signals […]

Hackers weaponize GenAI to boost cyberattacks
  • Article
  • Artificial Intelligence (AI)
  • cyberattacks
  • cybersecurity
  • Enterprise
  • GenAI
  • machine identities
  • Technology

Hackers weaponize GenAI to boost cyberattacks

  • 0

Adversaries are weaponizing GenAI to scale operations and accelerate cyberattacks — as well as increasingly targeting the autonomous AI agents […]

83 percent of credential stuffing campaigns target APIs
  • API
  • Article
  • credential stuffing
  • cyberattacks
  • cybersecurity
  • Technology

83 percent of credential stuffing campaigns target APIs

  • 0

According to new research from Radware 83 percent of credential stuffing campaigns include explicit API-targeting techniques. The report shows a […]

What’s behind the recent rise in identity-based attacks? [Q&A]
  • Article
  • CrowdStrike
  • cyberattacks
  • cybersecurity
  • Identity
  • Phishing
  • Q&A
  • social engineering
  • Technology

What’s behind the recent rise in identity-based attacks? [Q&A]

  • 0

Cybercriminals are increasingly using sophisticated identity-based attacks (phishing, social engineering, leveraging compromised credentials) to gain access as trusted users and […]

European manufacturers face critical vulnerabilities
  • Article
  • cyberattacks
  • cybersecurity
  • Europe
  • manufacturing
  • Technology
  • vulnerabilities

European manufacturers face critical vulnerabilities

  • 0

The manufacturing industry is the most targeted industry for cyberattacks and this has has now been the case for four […]

Why exposure validation is essential to cybersecurity resilience [Q&A]
  • Article
  • CTEM
  • cyberattacks
  • cybersecurity
  • Q&A
  • Technology
  • threat detection

Why exposure validation is essential to cybersecurity resilience [Q&A]

  • 0

Cybersecurity teams are often overwhelmed by an endless backlog of vulnerabilities, but not all of them are high risk. Traditional […]

56 percent of security incidents caused by lack of MFA
  • Article
  • cyberattacks
  • cybersecurity
  • mfa
  • multi factor authentication
  • Technology

56 percent of security incidents caused by lack of MFA

  • 0

Valid account credentials — with no MFA in place to protect the organization should they bemisused — are still by […]

Posts pagination

1 2 … 4 Next
  • Privacy Policy
  • Terms of use
Theme: Terminal News By Adore Themes.