ISC2 Security Congress: The Rise in Nation-State Cyber Threats

ISC2 Security Congress: The Rise in Nation-State Cyber Threats

Today’s threat landscape includes nation-state actors as well as attackers looking to test their skills or turn a profit. AT ISC2 Security Conference in Las Vegas, CISA advisor and former New York Times cybersecurity journalist Nicole Perlroth took the stage to discuss what has changed over the last 10 years of cyber warfare. Her presentation was the capstone of the conference, held Oct. 13-16. Nation-state attackers look for ‘target-rich, cyber-poor’ victims Perlroth presented a timeline…

Read More

Number of Active Ransomware Groups Highest on Record

Number of Active Ransomware Groups Highest on Record

This year has seen the highest number of active ransomware groups on record, with 58 attacking global businesses in the second quarter. Threat intelligence platform provider Cyberint has reported only a slight dip in the third quarter, with 57 active groups. Furthermore, in Q3, the top 10 ransomware groups were responsible for only 58.3% of all detected attacks. This reflects both the increase in the number of active groups in general and a decline in…

Read More

K-12 Schools and Libraries: Key Insights on FCC’s $200M Cybersecurity Pilot and Cisco Simplified Solutions

K-12 Schools and Libraries: Key Insights on FCC’s 0M Cybersecurity Pilot and Cisco Simplified Solutions

The Cybersecurity pilot program has officially launched. Learn how Cisco has streamlined solutions designed to enhance network security. On September 17, 2024, the FCC launched its cybersecurity pilot program. Interested parties can now submit an FCC Form 484 “part one” to apply for participation through the USAC’s EPC portal. The deadline for applications is November 1, 2024. K-12 schools and public libraries that wish to apply to the pilot program can do so by submitting…

Read More

NIS 2 Compliance Deadline Approaches: What You Need To Know

NIS 2 Compliance Deadline Approaches: What You Need To Know

On Oct. 17, the Network and Information Security 2 Directive takes effect. This means that relevant entities in industries such as energy, transport, water, healthcare, and digital infrastructure that carry out activities within the E.U. must comply with the relevant legislation. NIS 2, which was approved by the European Parliament in November 2022, aims to establish a consistent, minimum cybersecurity baseline across all E.U. member states, involving mandatory security measures and reporting procedures. Organisations subject…

Read More

Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024

Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024

A new report from cloud security company Zscaler sheds light on the growing mobile threats on Android operating systems, as well as IoT and OT devices threats. The findings come as more than 60% of the global Internet traffic is now generated by mobile devices and financially-oriented mobile threats have grown by 111% over the last year. A list of mobile malware threats Zscaler’s ThreatLabz witnessed a 29% rise in banking mobile malware over the…

Read More

How to Present Cybersecurity in a Way That Resonates

How to Present Cybersecurity in a Way That Resonates

Securing buy-in for cybersecurity projects in business requires a fine balance. If the rest of the C-suite believes the company is already secure, the CISO may struggle to get a budget for projects. Simultaneously, getting funding for preventative measures can be difficult to communicate. At the ISC2 Security Congress held in Las Vegas from Oct. 12-16, Safe-U founder and CEO Jorge Litvin shared strategies for framing security discussions in ways that resonate with executives. Why…

Read More

99% of UK Businesses Faced Cyber Attacks in the Last Year

99% of UK Businesses Faced Cyber Attacks in the Last Year

Nearly all businesses with at least 2,000 employees were breached by cyber attackers in the last 12 months, a new report has found. The biggest risk factor, cited by 46%, was remote and hybrid workers. Dispersed workforces raise the risk of data breaches by elying on unsecured networks and personal devices, and ensuring security protocols across multiple locations while managing access presents significant challenges for IT teams. “Where policies are inconsistent, they can create gaps…

Read More

Firefox Update Patches Exploited Vulnerability

Firefox Update Patches Exploited Vulnerability

Mozilla, the company behind the browser Firefox, issued a fix on Wednesday for a zero-day vulnerability they say has been exploited. NIST lists the vulnerability as CVE-2024-9680, and its status as “awaiting analysis.” Firefox users should update to the latest version of the browser and of the extended support releases to protect their systems from potential attacks. Due to widespread use of Firefox, this issue poses a significant risk, particularly for systems that haven’t been…

Read More

The Internet Archive Breach: Over 31 Million User Accounts Exposed

The Internet Archive Breach: Over 31 Million User Accounts Exposed

The Internet Archive, a non-profit digital library best known for its Wayback Machine, has disclosed a major data breach affecting over 31 million users as well as a series of distributed denial-of-service attacks. On the afternoon of Oct. 9, visitors of The Internet Archive started seeing pop-up messages that read: “Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just…

Read More

Only a Quarter of Cybersecurity Professionals are Women

Only a Quarter of Cybersecurity Professionals are Women

As of 2023, women make up only 20% and 25% of the cybersecurity workforce, according to training body ISC2. New research from Deloitte explores the reasons behind this gender gap, despite the high demand for skilled professionals in the industry. Half of young working women interested in cybersecurity feel they lack sufficient knowledge of the field to pursue a career in it. Furthermore, 55% of all women surveyed believe the industry could prove intimidating, and…

Read More
1 4 5 6 7 8 27