Only 25% of organizations are prepared to manage a DDoS attack

Only 25% of organizations are prepared to manage a DDoS attack

OPSWAT and Dark Survey collaborated on a survey revealing IT and corporate leadership concerns about organizational preparedness. Survey responses indicate a lack of preparedness for evolving cybersecurity threats, as only 25% of respondents feel their organization is fully equipped to manage DDoS attacks. For threats such as botnets, Advanced Persistent Threats (APTs), API security issues and zero-day malware, the expressed preparedness level is even lower.  Many respondents report experiencing attacks as well. These include:  24%…

Read More

Nashville man charged with aiding North Korean “laptop farms”

Nashville man charged with aiding North Korean “laptop farms”

A man from Nashville, Tennessee, has been charged for his attempts to generate revenue for North Korea’s illicit weapons program. The man is charged with conspiracy to damage protected computers, conspiracy to commit wire fraud, conspiracy to launder monetary instruments, and conspiracy to cause the unlawful employment of aliens. He has also been charged with intentional damage to protected computers and aggravated identity theft.  Craig Jones, Vice President of Security Operations at Ontinue, comments, “This…

Read More

Mitigating human risk: Empowering a workforce to combat cyber threats

Mitigating human risk: Empowering a workforce to combat cyber threats

In today’s digital landscape, organizations face an ever-evolving array of cyber threats, with phishing and social engineering remaining the most prevalent. As cybercriminals gain access to increasingly sophisticated tools, they continue to target employees, regarding them as the most vulnerable element of an organization’s defense. However, this perceived vulnerability can be transformed into an organization’s greatest asset in the fight against cyber threats. The human element: Both vulnerability and strength Traditionally, the human element has…

Read More

How to transform the defender’s dilemma into the defender’s advantage

How to transform the defender’s dilemma into the defender’s advantage

The notion that cybersecurity defenders are at an inherent disadvantage — the so-called defender’s dilemma — is incorrect and counterproductive. Instead of focusing solely on how we respond to attackers’ tactics, we can identify and use the advantages inherent in our position as defenders. This article explains what a defender-oriented mindset entails and how it can help you strengthen your security program. What’s the defender’s dilemma? For many years, security professionals have used the “defender’s…

Read More

Balancing trust and safety: Lessons from the CrowdStrike incident

Balancing trust and safety: Lessons from the CrowdStrike incident

On July 19, CrowdStrike, one of the largest endpoint security providers, issued an update to Windows servers globally that caused them to enter a “crash loop,” resulting in the infamous Blue Screen of Death (BSOD). CrowdStrike explained the issue was caused by a “defect found in a single content update for Windows hosts.” The downstream impact of this bug resulted in one of the largest and broadest outages in history. When situations like this occur,…

Read More

The bad actor’s best friend: Dormant service accounts

The bad actor’s best friend: Dormant service accounts

Dormant accounts, also known as inactive accounts, are accounts that haven’t been used or updated in at least 90 days. This extended period of inactivity gives them their “dormant” classification.  Since these accounts are not being actively used, it’s common for application owners not to know they exist. The lack of knowledge can be attributed to the fact that these accounts aren’t being accessed or updated, meaning they don’t appear in system logs or trigger…

Read More

New honeypot techniques for addressing targeted attacks

New honeypot techniques for addressing targeted attacks

Automated at-scale attack campaigns now represent the vast majority of online threats, and are starting to blend together with targeted attacks. As the number of these attacks increases, so does the cyber risk for organizations.   Unfortunately, the most common approaches to defense — including vulnerability management, phishing awareness, signature-based network and endpoint detection — are neither effective nor efficient in addressing these kinds of attacks because traditional third-party threat intelligence cannot provide adequate targeted…

Read More

Embrace the data sprawl, securely

Embrace the data sprawl, securely

Data is the lifeblood of every enterprise, so why does the task of managing and securing rapidly expanding volumes and types of data and new, modern threats continue to be a formidable challenge for most organizations? According to the Identity Theft Resource Center (ITRC), 2023 set a new record for data breaches, with data compromises jumping 78% over 2022. Malicious actors obviously see the value of data — but without visibility and controls into where…

Read More

The power of partnership in mitigating cyber risk: A CFO’s perspective

The power of partnership in mitigating cyber risk: A CFO’s perspective

Business leaders are charged with creating economic value. Escalating cybercrimes, however, pose critical threats to growth. Indeed, bad actors are increasingly creative and sophisticated with their craft. Viruses, worms, trojans, spyware, bricking, other malware, whaling, other forms of phishing, crypto-jacking, man-in-the-middle attacks, zero-day exploits or a good old fashioned brute force attack are just a few ways these bad actors can impinge on our ability to effectively run a business. And for unsuspecting companies, especially…

Read More

Empowering remote healthcare workers: A collaborative approach

Empowering remote healthcare workers: A collaborative approach

Healthcare organizations are increasingly adopting remote work as a permanent strategy. In this new era, robust cybersecurity is critical. This article delves into strategies healthcare organizations can implement to empower their remote workforce and protect sensitive patient and corporate data. Understanding shared security responsibility With remote employees now relying on IT resources beyond the control of healthcare organizations, the concept of shared security responsibility becomes paramount. It’s not just about organizations securing as much of…

Read More
1 2 3 4 5 6