Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

New research by cybersecurity firm Mandiant provides eyebrow-raising statistics on the exploitation of vulnerabilities by attackers, based on an analysis of 138 different exploited vulnerabilities that were disclosed in 2023. The findings, published on Google Cloud’s blog, reveals that vendors are increasingly being targeted by attackers, who are continually reducing the average time to exploit both zero-day and N-day vulnerabilities. However, not all vulnerabilities are of equal value to attackers, as their significance depends on…

Read More

53% of survey respondents admit to paying over $500,000 ransom

53% of survey respondents admit to paying over 0,000 ransom

Cyber-physical systems (CPS) security was analyzed in a recent report by Claroty. The findings revealed a significant financial impact, with over a quarter (27%) of organizations reporting a financial impact of $1 million or more from cyberattacks affecting CPS. Several factors contributed to these losses, the most common being lost revenue (selected by 39% of respondents), recovery costs (35%) and employee overtime (33%). Ransomware continues to play a big role in recovery costs, as over…

Read More

Fidelity Data Breach Exposes Data From 77,099 Customers

Fidelity Data Breach Exposes Data From 77,099 Customers

In August, a threat actor compromised the data of 77,099 Fidelity Investments customers in Maine, the financial firm said in a breach notification letter to thousands of customers on Oct. 9. The attacker didn’t access funds in Fidelity investment accounts. However, the hacker obtained personal information — including Social Security numbers and driver’s licenses — and created two new customer accounts. In response, Fidelity shut down the attacker’s access and offered affected customers a credit…

Read More

Calling for backup: The importance of disaster recovery

Calling for backup: The importance of disaster recovery

These days, everyone knows the importance of backing up their data. Everything needs to be backed up — from a laptop to the cloud platform on which many businesses rely. It feels fairly simple.  Unfortunately, with bad actors finding new ways to attack businesses every day, nothing is ever that easy. Threat actors know good backups are the cheat code to not paying the ransomware, giving victims the ability to rewind the clock to before…

Read More

A Microsoft under attack from government and tech rivals after 'preventable' hack ties executive pay to cyberthreats

A Microsoft under attack from government and tech rivals after 'preventable' hack ties executive pay to cyberthreats

Microsoft has come under fire recently from both the U.S. government and rival companies for its failure to stop a Chinese hack of its systems last summer. One change the tech giant is making in response: linking executive compensation more closely to cybersecurity. In April, a government review board described a hack of Microsoft last summer attributed to China as “preventable.” The U.S. Department of Homeland Security’s Cyber Safety Review Board pointed to “a cascade of…

Read More

Cyber attribution: Do you really need to know?

Cyber attribution: Do you really need to know?

Although Agatha Christie might disagree, sometimes mysteries should remain unsolved — at least in the cyber realm. Cyber attribution — finding exactly who perpetrated a given cyberattack — has seemingly become a cybersecurity goal in and of itself. But do organizations really need to know? Recognizing the “who” behind cyberattacks (not just the “what” and “how”) provides critical insights into the attacker’s objectives, infiltration methods, covert communication channels and more. Effective incident response hinges on…

Read More

Building cyber resilience through cyber tabletop exercises

Building cyber resilience through cyber tabletop exercises

Regular Cyber Tabletop Exercise (CTTX) drills act like a cyberattack simulation, revealing vulnerabilities and honing response skills before real attacks strike. By simulating diverse threats, from phishing scams to ransomware outbreaks, CTTX expose gaps in plans and strengthen overall organizational resiliency. A cybersecurity sandbox lets organizations refine their incident response playbook and ensure seamless integration with broader security strategies. Imagine peering into a microscope to examine the inner-workings of a cyberattack. CTTX do just that,…

Read More

Super Bowl security tips for planning corporate security strategy

Super Bowl security tips for planning corporate security strategy

While football fans are enjoying Super Bowl 58 on February 11, most viewers probably don’t realize how much preparation goes into securing such a colossal event. Like sporting events organizers, corporate teams can benefit from implementing some core ideas from big event security into their own security strategy. To see how, walk in the shoes of an event security team for a bit. The big stage attracts the big hack First, consider this iconic scenario:…

Read More

6 steps for protecting small businesses from cyberattacks

6 steps for protecting small businesses from cyberattacks

6 steps for protecting small businesses from cyberattacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Fighting the dark side of generative AI

Fighting the dark side of generative AI

Fighting the dark side of generative AI | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2 3