Author: Staff Writer

Avatar photo

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Global IT services provider FPT has signed a Memorandum of Understanding (MOU) with Cymotive Technologies, an Israel-based leader in automotive cybersecurity. This agreement initiates a collaboration to introduce Cymotive’s proven cybersecurity solutions to FPT’s established automotive customer base, jointly develop and deliver next-generation cybersecurity solutions for Software-Defined Vehicles (SDVs), and advance safer, smarter, and more connected mobility. The MOU lays the groundwork for a strategic collaboration focused on the joint development and commercialization of advanced cybersecurity solutions tailored to the evolving demands of the automotive industry. The agreement focuses on leveraging and commercializing Cymotive’s pioneering cybersecurity solutions, extensive engineering experience, and…

Read More

Fast Facts VF Corporation notified over 2,800 individuals of a credential stuffing attack on The North Face website, where hackers accessed user accounts using previously compromised email addresses and passwords. The breach occurred on April 23, allowing attackers to obtain personal information like names, addresses, and purchase details, although no payment card information was compromised, as it is securely tokenized. VF Corporation promptly disabled passwords for the affected accounts and urged users to create strong, unique passwords to prevent similar incidents. Users are advised to be vigilant against phishing threats, as attackers may use the compromised data to impersonate the…

Read More

With more than $100 million raised and 300% revenue growth since its Series B, Zero Networks is shifting the balance of power in cybersecurity from attackers to defenders Zero Networks, the cybersecurity company reclaiming microsegmentation to finally deliver on its promise, announced it raised $55 million in Series C funding. The raise solidifies Zero Networks’ position at the forefront of the “Era of the Defender” – a paradigm shift in cybersecurity where the burden of effort no longer falls on defenders reacting to threats, but on attackers forced to confront proactive, identity- and network-driven controls. At the heart of Zero…

Read More

Top Highlights New European Security Program: Microsoft launched a European Security Program aimed at enhancing cybersecurity for EU governments, expanding its existing Government Security Program to all EU countries and allies. Focus on State-Sponsored Threats: The initiative targets cyberattacks from state-backed actors in Russia, Iran, China, and North Korea, addressing prominent espionage activities attempting to infiltrate European networks. AI-Driven Defense: The program emphasizes artificial intelligence to provide real-time threat insights and actionable intelligence, enhancing detection and response to sophisticated cyber threats. Strengthening Collaborations: Microsoft will renew partnerships with various organizations, including Europol, to develop defense measures, track new threats, and…

Read More

CompassMSP LLC (“Compass”), a leader in the IT and cybersecurity managed services industry, is pleased to announce the appointment of Michael Rapp as Chief Executive Officer. Rapp brings over 20 years of leadership experience in building high-growth platforms and winning cultures across the technology services sector—from startups to publicly traded, multi-billion-dollar companies. Rapp succeeds Ari Santiago, who is stepping back from the role while remaining a significant investor and continuing with the company as a Strategic Advisor, working with the Board and Rapp. Cyber Technology Insights : Fortinet Launches Cybersecurity Curriculum in Australia to Boost Digital Resilience in Schools After completing its…

Read More

Members of a financially motivated threat group are impersonating IT support staff in convincing phone calls and talking employees into granting access to their organization’s Salesforce environments.Over the past several months, the threat actor, whom Google’s threat intelligence group is tracking as UNC6040, has breached multiple organizations in this fashion and stolen large volumes of data from within their Salesforce platforms with a view to extort them later. Many of the victims have been within English-speaking branches at large multinational companies.No Hack Attacks”A prevalent tactic in UNC6040’s operations involves deceiving victims into authorizing a malicious connected app to their organization’s…

Read More

Summary Points DLP Ineffectiveness: Traditional Data Leakage Prevention (DLP) tools struggle to secure modern SaaS environments, where 70% of enterprise data leaks occur in-browser, making legacy systems obsolete. Invisible Data Risks: Over half of all data leaks involve covert actions, such as copying data into chat apps, which traditional DLP solutions fail to monitor or address. Browser as Control Point: With sensitive data primarily residing in browser sessions, transitioning to browser-centric DLP is essential for addressing security challenges associated with real-time interactions and unauthorized tools. Proactive Monitoring: A browser-centric approach continuously monitors user actions, distinguishing between personal and corporate activities,…

Read More

Claroty, the cyber-physical systems (CPS) protection company, is marking ten years since the company’s founding in 2015. Since then, Claroty has gone on to achieve market-leading success across the industry, including sustained and rapid company growth, developing award-winning innovations, abundant third-party recognition, world-renowned research, explosive partnership growth, and continued investment in the cyber community. Today, Claroty boasts the deepest asset visibility and the broadest solution set, including exposure management, network protection, secure access, threat detection, and operational efficiency. The Claroty Platform brings the flexibility to be deployed in the cloud with Claroty xDome and on-premise with Claroty CTD, as well…

Read More

Essential Insights Introduction of Chaos RAT: A new remote access trojan (RAT), Chaos RAT, targets both Windows and Linux systems, being distributed through deceptive downloads masquerading as network troubleshooting utilities. Functionality: Chaos RAT, an open-source tool written in Golang, allows attackers to perform various actions on compromised machines, such as file manipulation, system information gathering, and executing commands once it connects to an external server. Recent Trends: Recent campaigns have linked Chaos RAT to cryptocurrency mining, with malware often delivered through phishing tactics that modify system tasks for persistent access. Vulnerabilities and Attribution Challenges: The administrative panel of Chaos RAT…

Read More

SDG, a global provider of AI-driven identity, threat, and risk management solutions, announced its acquisition of Synergetika, a solutions provider specializing in Privileged Access Management (PAM). This strategic move strengthens SDG’s delivery capabilities and deepens its expertise in helping organizations secure critical systems through expert PAM strategy and implementation. Privileged access abuse is a top cause of cyberattacks, especially insider threats and lateral movement within compromised systems. Organizations of all sizes understand that an effective PAM program is crucial to prevent breaches and protect critical infrastructure, particularly in industries like finance, healthcare, and energy, where the stakes are higher. Cyber Technology Insights : Kyndryl…

Read More