Increasing Awareness of DNS Hijacking: A Growing Cyber Threat

Increasing Awareness of DNS Hijacking: A Growing Cyber Threat

A recent report from Palo Alto Networks’s Unit 42 exposes the persistent and evolving threat of DNS hijacking, a stealthy tactic cybercriminals use to reroute internet traffic. By leveraging passive DNS analysis, the cybersecurity company also provided real-world examples of recent DNS hijacking attacks — highlighting the urgency of countering this hidden danger. What is DNS hijacking? DNS hijacking involves modifying the responses from targeted DNS servers, redirecting users to attacker-controlled servers instead of the…

Read More

Cyber Insurance Premiums Are Declining, Howden Insurance Brokers Report Finds

Cyber Insurance Premiums Are Declining, Howden Insurance Brokers Report Finds

Improved cyber hygiene among businesses has led to a reduction in cyber insurance premiums by 15% worldwide over the last two years, a new report from Howden Insurance Brokers has found. This is despite the fact that cyberthreats, particularly ransomware attacks, are becoming more prevalent. Awareness of cyber hygiene practices, like multifactor authentication, EDR and cloud backups, has grown significantly since 2022. Ransomware attacks have increased by 18% this year, according to Howden and NCC…

Read More

Top 5 Global Cyber Security Trends of 2023, According to Google Report

Top 5 Global Cyber Security Trends of 2023, According to Google Report

It is taking less time for organisations to detect attackers in their environment, a report by Mandiant Consulting, a part of Google Cloud, has found. This suggests that companies are strengthening their security posture. The M-Trends 2024 report also highlighted that the top targeted industries of 2023 were financial services, business and professional services, tech, retail and hospitality, healthcare and government. This aligns with the fact that 52% of attackers were primarily motivated by financial…

Read More

Defusing the threat of compromised credentials

Defusing the threat of compromised credentials

Let’s say that, during the middle of a busy day, you receive what looks like a work-related email with a QR code. The email claims to come from a coworker, requesting your help in reviewing a document.  You scan the QR code with your phone and it takes you to what looks like a Microsoft 365 sign-in page. You enter your credentials; however, nothing seems to load.   Not thinking much of it, and being a…

Read More

Top 6 Passwordless Authentication Solutions for 2024

Top 6 Passwordless Authentication Solutions for 2024

Best for remote and hybrid workforces: Keeper Best passwordless authentication solution for developers: Okta Best for Microsoft Azure cloud environments: Microsoft Entra ID Best passwordless authentication for SMBs: Cisco Duo Best IAM solution for enterprises: Ping Identity Best hardware solution for passwordless authentication: Yubico Passwordless authentication allows users to login to devices and applications without entering a password. Common passwordless authentication methods include FIDO2 biometrics like fingerprints and facial recognition, smart cards and mobile apps…

Read More

6 Best Authenticator Apps for 2024

6 Best Authenticator Apps for 2024

Authenticator apps are increasing in adoption as they add another layer of security to user identity verification. A study found 90% of organizations reported identity-related breaches last year, and authenticator apps are designed to help reduce this number. Authenticator apps help individuals and organizations double-check user identity by using two-factor or multi-factor authentication to verify and authenticate user identities before granting access to them. In this article, we will review the best authenticator apps in…

Read More

6 Best Multi-Factor Authentication (MFA) Solutions for 2024

6 Best Multi-Factor Authentication (MFA) Solutions for 2024

Best free MFA app for individuals: Google Authenticator Best MFA software for small to medium-sized businesses: Cisco Duo Best MFA solution for developers in startups and nonprofits: Auth0 Best MFA software for enterprises: PingID Best MFA solution for developers building self-hosted applications: FusionAuth Best for building a customized workforce IAM solution: Okta Multi-factor authentication requires users to present two or more pieces of evidence to prove their identity, such as a password and a one-time…

Read More

MFA vs 2FA: Which Is Best for Your Business?

MFA vs 2FA: Which Is Best for Your Business?

Breaches are more common than ever, phishing scams continue to have success and AI is helping to take cybercrime to a whole new level. Hornetsecurity’s Cyber Security Report 2024 analyzed 45 billion emails sent in 2023 — 3.6% were considered malicious. That’s 1.6 billion potentially harmful emails. Almost half of all email-based attacks use phishing to obtain the passwords of users. If a user falls for a phishing scam and their credentials are compromised, multi-factor…

Read More

5 Benefits of Passwordless Authentication

5 Benefits of Passwordless Authentication

Passwordless technology is gaining traction due to the dizzying number of passwords that the average user accumulates. When you tally up email, phone, banking, travel, rideshare, hospitality, browsers and the fact that just about every service wants you to download their app and enter a password, it is no wonder that most users repeat the same passwords or adjust them only slightly (making it easy for hackers to crack them). Passwordless authentication is a way…

Read More

Spear Phishing vs Phishing: What Are The Main Differences?

Spear Phishing vs Phishing: What Are The Main Differences?

Threat actors love phishing because it works. It is particularly effective in cloud infrastructure—once they’re inside, they gain access to anything else related to that cloud. According to Hornetsecurity’s Cyber Security Report 2024, there were 1.6 billion potentially harmful emails sent during 2023. Almost half of them used phishing to obtain the passwords of users. This makes it by far the most common attack vector. But not all phishing is the same. Highly targeted phishing…

Read More
1 2