cyberattacks
Cybersecurity Insights with Contrast CISO David Lindner | 3/15/24
Insight #1 If you want insight into how difficult security is, look at the Cybersecurity and Infrastructure Security Agency (CISA). The agency was recently breached through a Common Vulnerability and Exposure (CVE) ...
Cybersecurity Insights with Contrast CISO David Lindner | 3/8/24
Insight #1 If you’re not performing routine tabletop exercises to ensure that your organization is protected from cybersecurity vulnerabilities, you should be. It's one thing to have detailed processes for executing during ...
Cybersecurity Insights with Contrast CISO David Lindner | 3/1/24
Insight #1 As was made clear by the recent blowup over Google’s Gemini image creation tool last week (it generated “embarrassing and offensive results,” as one publication put it), AI is proving ...
Report: Average Initial Ransomware Demand in 2023 Reached $600K
An Arctic Wolf report found the median initial ransom demand made by cybercriminals rose 20% year-over-year to $600,000 ...
Malicious Packages in npm, PyPI Highlight Supply Chain Threat
Software developers are being targeted with malicious packages in npm and PyPI as threat groups launch software supply-chain attacks ...
Cybersecurity Insights with Contrast CISO David Lindner | 2/23/24
Insight #1 The post quantum encryption era is upon us, and Apple is leading the charge to protect against future quantum computing attacks by boosting security on its iMessage platform, adding a ...
Cybersecurity Insights with Contrast CISO David Lindner | 2/16/24
Insight #1 How are you protecting your web and application programming interface (API) applications from attack? In 2023, Contrast Protect blocked 12 million legitimate attacks (including zero days such as the recent ...
Harnessing Artificial Intelligence for Ransomware Mitigation
Without AI, organizations will continue to suffer and struggle with recovery when faced with ransomware and other cyberattacks ...
Stopping Credential Stuffing Attacks: We Need to Do Better
Do you know what 23andMe, Jason's Deli, North Face, and Hot Topic have in common? They've all been breached by successful credential stuffing attacks in the last year! An attack type that ...
Datadog Report Surfaces Pair of Sophisticated AWS Attacks
A Datadog report found that cybercriminal activity aimed specifically at AWS cloud infrastructure services is increasing ...