It can’t have escaped everyone's attention, since the move to the cloud the number of data breaches has gone through the roof. In this article, I’m going to run through why this is happening, why workplace policy won’t fix it, and what your organization can do to reduce the risk of being next.
There was a 37 percent increase worldwide in enterprise mobile phishing encounter rate between the fourth quarter of 2019 and the first quarter of 2020, according to Lookout.The report also shows that unmitigated mobile phishing threats could cost organizations with 10,000 mobile devices as much[...]
Earlier this month, when F-Secure publicly revealed the existence of two vulnerabilities affecting SaltStack Salt and attackers started actively exploiting them, Cisco was among the victims.The revelation was made on Thursday, when Cisco published an advisory saying that, on May 7, 2020, they’ve[...]
Once considered a loader for other malware, Valak regularly conducts reconnaissance and steals information and credentials, new analysis shows.Over the past six months, a surge of development activity on a malicious program known as Valak — traditionally used for loading other malware on[...]
Threat actors are pivoting away from noisy website attacks to campaigns that are quieter and designed to remain undetected for as long as possible.From website defacements and SEO spam, attackers are increasingly targeting websites to install backdoors and other stealthy malware, according to a[...]
GoDaddy has reported that a breach occurred in October, resulting in unauthorized access to certain SSH accounts hosted by the provider. According to a notice sent to affected customers, the breach had an impact only on SSH accounts: No "main GoDaddy accounts" were affected by the activity.The[...]
Cyber scammers are starting to use legitimate reCAPTCHA walls to disguise malicious content from email security systems, Barracuda Networks has observed. The reCAPTCHA walls prevent email security systems from blocking phishing attacks and make the phishing site more believable in the eyes of[...]
A cybercriminal group dubbed the Florentine Banker Group launched advanced business email compromise (BEC) attacks on leading Israeli and UK financial firms, stealing $1.3 million dollars in just four separate transactions.Unlike a basic BEC where an attacker sends one or two emails posing as an[...]
Imagine installing a fancy deadbolt lock with a state-of-the-art alarm system for your front door but leaving the back door wide open. No one would do that, right? Yet many companies make a similar mistake with their cybersecurity defenses. They put Fort Knox-like security on the front end of[...]
The volume and complexity of attacks continued to grow in the first quarter of 2020, according to Link11.There has been an increasing number of high-volume attacks in Q1 2020, with 51 attacks over 50 Gbps. The average bandwidth of attacks also rose, reaching 5,0 Gbps versus 4,3 Gbps in the same[...]
Our unique positioning on the global market enables us to be at the forefront of every new technology and with that unique expertise we help our clients to quickly and cost effectively choose, test and deploy the best solutions to service their customer base.