Delivery Scams Most Prominent Form of Smishing

Delivery Scams Most Prominent Form of Smishing

Texts purporting to be from parcel and delivery companies are the most prevalent form of ‘smishing’ scams, according to new data provided to UK Finance by cybersecurity firm Proofpoint. The data showed that over two-thirds (67.4%) of all UK texts reported as spam to the NCSC’s 7726 text messaging system, operated by Proofpoint, during the 30 days to mid-July 2021, were supposedly from delivery companies. The next highest category of scam texts was those pretending to…

Read More

Half of US Hospitals Shut Down Networks Due to Ransomware

Half of US Hospitals Shut Down Networks Due to Ransomware

Nearly half (48%) of US hospitals have disconnected their networks in the past six months due to ransomware, according to a new study from Philips and CyberMDX. The Perspectives in Healthcare Security Report is based on interviews with 130 IT and cybersecurity hospital executives and biomedical engineers and technicians. The findings revealed the outsized impact ransomware continues to have on healthcare organizations (HCOs) after they battled a surge in attacks during the early months of the pandemic. Respondents who admitted to shutting…

Read More

What are the cyber security challenges of hybrid working?

What are the cyber security challenges of hybrid working?

When it comes to the ideal post-pandemic work environment, employers and employees and have very different ideas. According to a Microsoft study, 73% of workers want to keep the flexible work arrangements created in response to COVID-19, and 67% want a return to in-person collaboration. The overlap in these figures suggests that there isn’t a clear divide between those who want to stay at home and those that want a return to the office. Rather,…

Read More

‘Jigsaw Puzzle’ Phishing Attacks Use Morse Code to Hide

‘Jigsaw Puzzle’ Phishing Attacks Use Morse Code to Hide

Microsoft has revealed a “unique” phishing campaign using novel techniques to stay hidden from conventional email security filters. The primary motivation of those behind the emails is to steal usernames and passwords, IP addresses and location data that can be used as entry points for later attacks. Classic social engineering techniques are employed to trick users into opening a .xls HTML file. Opening the attachment takes the victim to a fake Microsoft Office 365 credentials dialog…

Read More

Europol: Islamic State Propaganda Networks Are Thriving

Europol: Islamic State Propaganda Networks Are Thriving

Official propaganda from the Islamic State (IS) dwindled during 2020 after disruption from Western coalition forces, but informal supporter networks continue to spread its message far and wide, Europol has warned. The law enforcement agency’s latest Online Jihadist Propaganda report analyzed the key trends of last year, highlighting the persistence of terrorist content across multiple online channels. “Jihadist terrorist groups dedicate significant efforts to set up effective online communication campaigns. The production and dissemination of…

Read More

4 steps to prepare for a ransomware attack: A C-suite guide

4 steps to prepare for a ransomware attack: A C-suite guide

4 steps to prepare for a ransomware attack: A C-suite guide | 2021-08-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Machine identities: What they are and how to use automation to secure them

Machine identities: What they are and how to use automation to secure them

Machine identities: What they are and how to use automation to secure them | 2021-08-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Effective cyber risk mitigation requires a holistic mindset-shift

Effective cyber risk mitigation requires a holistic mindset-shift

Effective cyber risk mitigation requires a holistic mindset-shift | 2021-08-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How Did the Cybersecurity Ecosystem Get So Clogged Up?

How Did the Cybersecurity Ecosystem Get So Clogged Up?

Today’s enterprise operations involve the coordination of several different digital ecosystems but none quite so inflamed as the cybersecurity ecosystem. Technology has been evolving at a rapid pace, and attackers are armed with advanced tactics to steal data and expose secure information. In response, cybersecurity teams deploy numerous tools and solutions to prevent and mitigate these attacks. The need for diligent cybersecurity is critical, but clogging up security ecosystems with multitudes of tools is not…

Read More
1 2,209 2,210 2,211 2,212 2,213 2,656