State-backed hackers targeted US-based journalists in widespread spy campaigns: report

State-backed hackers targeted US-based journalists in widespread spy campaigns: report

State-sponsored hackers from China, North Korea, Iran and Turkey have been regularly spying on and impersonating journalists from various media outlets in an effort to infiltrate their networks and gain access to sensitive information, according to a report released on Thursday by cybersecurity firm Proofpoint.  The report reveals that government-backed hackers used various tools to target journalists, including sending phishing emails to gain access to reporters’ work emails, social media accounts and networks. The report…

Read More

Proofpoint: ‘Potentially Dangerous’ Flaw Could Allow Ransomware Attacks On Microsoft SharePoint, OneDrive

Proofpoint: ‘Potentially Dangerous’ Flaw Could Allow Ransomware Attacks On Microsoft SharePoint, OneDrive

A “potentially dangerous” flaw has been found in Microsoft Office 365 that could allow cyberattackers to ransom files stored on Sharepoint and OneDrive, two widely used enterprise cloud apps, according to researchers at Proofpoint. The Proofpoint researchers revealed their findings Thursday morning in a blog post and concluded that cloud data may be more vulnerable to ransomware assaults than previously believed. “Ransomware attacks have traditionally targeted data across endpoints or network drives,” wrote the Proofpoint…

Read More

Alarming Cyber Statistics For Mid-Year 2022 That You Need To Know

Alarming Cyber Statistics For Mid-Year 2022 That You Need To Know

Global cyber futuristic financial network security concept. Fast speed internet connection. Block … [+] chain network getty A couple of times per year, I take a deep dive on writing about the newly reported cybersecurity statistics and trends that are impacting the digital landscape. Unfortunately, despite global efforts, every subsequent year the numbers get worse and show that we are far from being able to mitigate and contain the numerous cyber-threats targeting both industry and…

Read More

Block This Now: Cobalt Strike and Other Red-Team Tools

Block This Now: Cobalt Strike and Other Red-Team Tools

Application Security , Cybercrime , Cybercrime as-a-service Attackers Keep Wielding Legitimate Tools and ‘Living Off the Land’ Tactics Mathew J. Schwartz (euroinfosec) • December 31, 2021     Attackers continue to use the legitimate Cobalt Strike tool set to target victims. Many attackers – highly skilled or otherwise – employ “living off the land” tactics, which means using legitimate tools or functionality already present in a network to target a victim. Accordingly, organizations need to…

Read More

16 Tools, Technologies And Strategies For MSPs To Fight Phishing Attacks

16 Tools, Technologies And Strategies For MSPs To Fight Phishing Attacks

Proofpoint Simulated Phishing Campaigns Mark Cooley, Vice President of Security and Compliance, Cedar Rapids, Iowa-based Involta, No. 255 on the 2021 CRN Solution Provider 500 Phishing attack prevention is all about end-user awareness and ongoing training. As I mentioned before, phishing attacks are a people and process vulnerability that is often overlooked. There are a variety of tools in the marketplace that companies can use to deploy…

Read More

The role of the CFO in enterprise cybersecurity

The role of the CFO in enterprise cybersecurity

The role of the CFO in enterprise cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Protecting hospitals from supply-chain counterfeits and other security threats

Protecting hospitals from supply-chain counterfeits and other security threats

Protecting hospitals from supply-chain counterfeits and other security threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Ransomware prevention tactics keep businesses healthy

Ransomware prevention tactics keep businesses healthy

Ransomware prevention tactics keep businesses healthy | 2021-07-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Is cyber insurance costing you 30% more?

Is cyber insurance costing you 30% more?

Is cyber insurance costing you 30% more? | 2021-07-07 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 18 19 20 21 22