How to guard against the holiday cyberattack surge

How to guard against the holiday cyberattack surge

Historical trends indicate a marked increase in cyberattacks during the holiday season. Cybercriminals take advantage of heightened online activity and digital transactions, using this busy period to target consumers with precision. However, it’s not just individual shoppers who are at risk — enterprises are equally vulnerable. In fact, recent research shows a staggering 550% surge in unique threats during this time of year. Organizations become prime targets for a wide array of cyberattacks as the…

Read More

Top cyber threats targeting the Paris Olympics

Top cyber threats targeting the Paris Olympics

The 2024 Paris Olympics are quickly approaching, captivating the global sporting community. The promise of thrilling competition, and a spirit of international unity has ignited a digital firestorm. However, this surge in online activity presents a compelling opportunity for cybercriminals, as users increasingly engage with digital accounts such as travel, finance and online gambling.  The 2020 Tokyo Games, for example, witnessed a staggering 450 million attempted cyberattacks, highlighting the vulnerability of major sporting events in…

Read More

Cybercriminals target SAP vulnerabilities

Cybercriminals target SAP vulnerabilities

Cybercriminals are getting better at attacking critical business applications, according to a recent report by Onapsis. The report found a rise in threat actors targeting SAP vulnerabilities.  According to the report, 2023 was an important year for the SAP application threat landscape. The report found a 400% increase in ransomware incidents that involved compromising SAP systems and data at victim’s organizations.  The report found that conversations on SAP vulnerabilities and exploits have increased 490% across…

Read More

CISOs aren’t scapegoats: Fostering a security-first culture

CISOs aren’t scapegoats: Fostering a security-first culture

Ten years ago, it was the norm for security breaches to be the sole responsibility of the chief information security officer (CISO). For this reason, the CISO role traditionally had a higher turnover rate, with many experiencing extreme burnout. But now, as data breaches make regular headlines and every organization becomes a lucrative target for cybercriminals, IT security has become a business priority, causing the full C-suite to take note.  Cybersecurity is now a business…

Read More

The return of a malware menace.

The return of a malware menace.

This week we are joined by, Selena Larson from Proofpoint, who is discussing their research, “Bumblebee Buzzes Back in Black.” Bumblebee is a sophisticated downloader used by multiple cybercriminal threat actors and was a favored payload from its first appearance in March 2022 through October 2023 before disappearing. After a four month hiatus, Proofpoint researchers found that the downloader returned. Its return aligns with a surge of cybercriminal threat activity after a notable absence of…

Read More

Closing the gap between physical and cybersecurity

Closing the gap between physical and cybersecurity

With an increase in in-person work, security leaders have looked into improving their physical security solutions. This could include updating their access control measures, video surveillance or hiring additional security staff. According to the Genetec State of Physical Security Report, 33% of respondents stated that their physical security systems were on-premises and 67% were cloud or hybrid-cloud. Fifty-five percent of respondents stated that their information technology (IT) department has access to physical security data. The…

Read More

Fighting the dark side of generative AI

Fighting the dark side of generative AI

Fighting the dark side of generative AI | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Find the balance between security and privacy in a BYOD world

Find the balance between security and privacy in a BYOD world

Find the balance between security and privacy in a BYOD world | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More