Ransomware Trends: Most Attacks Hit Between 1am and 5am, Study Finds

Ransomware Trends: Most Attacks Hit Between 1am and 5am, Study Finds

Threat actors are taking advantage of when security professionals are off-duty to stage their ransomware attacks, new research has found. The ThreatDown 2024 State of Ransomware report from Malwarebytes has revealed most incidents in the last year occurred between 1 a.m. and 5 a.m. The report’s authors used data from the ThreatDown Managed Detection and Response team to conduct their research. It found that global ransomware attacks increased by 33% in the last year, with…

Read More

Tesserent Offers Mental Health Tips for Australian CISOs

Tesserent Offers Mental Health Tips for Australian CISOs

Cyber professionals in the APAC region are no strangers to work-related stress. Reports have indicated that most cyber workers in the region experience burnout, with as many as 9 in 10 employees impacted on some level. Causes of burnout include a lack of resources and alert fatigue, resulting in employee anxiety or disengagement. Senior executives at Australian cybersecurity firm Tesserent have offered some advice for CISOs who want to preserve their mental health in the…

Read More

Calling for backup: The importance of disaster recovery

Calling for backup: The importance of disaster recovery

These days, everyone knows the importance of backing up their data. Everything needs to be backed up — from a laptop to the cloud platform on which many businesses rely. It feels fairly simple.  Unfortunately, with bad actors finding new ways to attack businesses every day, nothing is ever that easy. Threat actors know good backups are the cheat code to not paying the ransomware, giving victims the ability to rewind the clock to before…

Read More

National Public Data Breach: 2.7bn Records Leaked on Dark Web

National Public Data Breach: 2.7bn Records Leaked on Dark Web

In August, a hacker dumped 2.7 billion data records, including social security numbers, on a dark web forum, in one of the biggest breaches in history. The data may have been stolen from background-checking service National Public Data at least four months ago. Each record has a person’s name, mailing address, and SSN, but some also contain other sensitive information, such as names of relatives, according to Bloomberg. How the data was stolen This breach…

Read More

Microsoft Azure Outage Caused by DDoS Attack

Microsoft Azure Outage Caused by DDoS Attack

Microsoft has confirmed the cause of the outage on July 30 was a distributed denial-of-service attack. However, its advisory added that the issue was exacerbated by an “error in the implementation of their defenses” during a mitigation attempt. The Azure cloud services were impacted between approximately 11:45 UTC and 19:43 UTC after being flooded by internet traffic. Redmond security pros say that the Azure Front Door and Azure Content Delivery Network components were “performing below…

Read More

Cyber Security Public-Private Partnerships Are Taking Off in APAC

Cyber Security Public-Private Partnerships Are Taking Off in APAC

APAC governments are partnering more closely with private-sector organisations and cyber security tech providers as part of public-private partnership style arrangements. These collaborations can include threat intelligence sharing, cyber capacity building, research and joint investigations. As the cyber threat continues to grow in APAC, including from ransomware attackers and nation-state actors, the hope is that integrated collaboration between governments and businesses will lead to a more cohesive response. What is a cyber security public-private partnership?…

Read More

BlastRADIUS Vulnerability Discovered in RADIUS Protocol

BlastRADIUS Vulnerability Discovered in RADIUS Protocol

Cyber security researchers have exposed a vulnerability in the RADIUS protocol, dubbed BlastRADIUS. While there is no evidence that threat actors are actively exploiting it, the team is calling for every RADIUS server to be upgraded. What is the RADIUS protocol? RADIUS, or Remote Authentication Dial-In User Service, is a networking protocol that provides centralised authentication, authorisation and accounting for users connecting to a network service. It is widely used by internet service providers and…

Read More

Nearly 10 Billion Passwords Leaked in Biggest Compilation of All Time

Nearly 10 Billion Passwords Leaked in Biggest Compilation of All Time

The world’s largest compilation of passwords to be leaked online has been discovered by a research team at Cybernews, containing 9,948,575,739 unique plaintext entries. The credentials were discovered in a file named “rockyou2024.txt” that was posted on a popular hacking forum on July 4, 2024. Many of the so-called RockYou2024 passwords have already been leaked in previous data breaches. This is not the first RockYou data dump either, as the name has been associated with…

Read More

Dragos: Industrial Cyber Security Basics Can Help Protect APAC OT Operators

Dragos: Industrial Cyber Security Basics Can Help Protect APAC OT Operators

Industrial cyber security in APAC is still lagging behind enterprises, but having some basic hygiene and a plan in place is “light years” better than nothing, according to director of incident response at operational technology cyber security firm Dragos Lesley Carhart. Carhart recommends industrial technology operators large or small in APAC realise they could all be targets, including from state actors looking to steal information or position themselves for a future geopolitical event, and to…

Read More

10 Security Tips for Business Travellers This Summer

10 Security Tips for Business Travellers This Summer

Now the weather is hotting up, many workers may be considering spending some time away from their desk. You may be more inclined to head to that conference in Barcelona or take a trip with the family but keep the company phone on you. Whether you’re hopping on a plane or enjoying a staycation closer to home, taking your business away from your regular workplace brings about a new bevy of security risks. These include…

Read More
1 3 4 5 6 7 130