NIST Approves Quantum-Resistant Encryption Standard
CRYSTALS-Kyber chosen as the new PQC algorithm for government use, a significant development in the advancement of cryptography secure against quantum attacks.
Surge in AI-Enhanced Cyberattacks Noted at 300%
A recent report indicates a significant increase in the use of generative AI by malicious entities for creating elaborate phishing schemes and improving their stealth.
Surveillance on Global Stability
Northern America
- Major technology corporation incurs $25M FTC penalty for privacy infractions resembling those under GDPR
- Government contractors required to implement MFA under new CISA regulations
- Health sector at risk as ransomware-as-a-service groups intensify attacks
Europe
- The EU's Cyber Resilience Act moves to the final stage of approval
- Proposed revisions to GDPR aim to enforce stricter regulations on artificial intelligence
- A significant illegal digital marketplace taken down by Interpol
Asia-Pacific
- An AI cybersecurity certification scheme is launched in Singapore
- Japan experiences unprecedented scale of DDoS attacks
- Australian law now mandates immediate disclosure of security breaches, within a day
Advances in Technology
- Advancement in Homomorphic Encryption - Innovative approach allows 100 times quicker calculations on encrypted information
- Artificial Intelligence Security Assistants - Collaborative release of new developer tools by Microsoft and PivotInformation
- Protocols for 5G Security - Newly published set of rules from GSMA to safeguard network slicing
Forthcoming Occasions
- Black Hat 2025 - Registration for the event now available at a discounted rate
- Summit on Zero Day Strategies - Ongoing series of workshops on CVE, accessible virtually
- Summit on Cloud Computing Security - Featuring lectures by specialists from AWS, Azure, and GCP
Focus on Threat Intelligence
| Threat Actor | Target | TTPs | Risk Level |
|---|---|---|---|
| Lazarus Group | Financial Sectors | Supply Chain Compromise | High |
| FIN7 | Commerce Chains | Fileless Malware | Medium |
Participate in the Discussion
If you're engaged in cybersecurity, whether as a security analyst, IT professional, or technology writer, your contributions are valued. Submit guest articles and threat analyses.
Add your voice to the international cybersecurity conversation and solidify your authority in the field.
Updated Daily - Because Threats Never Sleep.
Stay on guard with PivotInformation Security Intelligence.