How to Protect Yourself From a Spear Phishing Scam | McAfee Blog

How to Protect Yourself From a Spear Phishing Scam | McAfee Blog

As the name implies, spear phishing attacks are highly targeted scams. They often occur in professional settings, where the scammers go after one “big phish,” such as a ranking employee with access to finances or data. From there, the scammers employ social engineering (aka manipulation) to trick the target into transferring funds to them or giving them access to sensitive company systems. Sometimes, it’s a mix of both. Some of the most striking examples of spear…

Read More

IBM X-Force Report: Grandoreiro Malware Targets More Than 1,500 Banks in 60 Countries

IBM X-Force Report: Grandoreiro Malware Targets More Than 1,500 Banks in 60 Countries

A new report from IBM X-Force exposes changes in the Grandoreiro malware landscape. The banking trojan is now capable of targeting more than 1,500 global banks in more than 60 countries, and it has been updated with new features. Also, Grandoreiro’s targeting has become wider, as it initially only targeted Spanish-speaking countries, while recent attack campaigns targeted countries in Europe, Asia and Africa. In addition, the malware is now sending phishing emails directly from the…

Read More

Verizon 2024 Data Breach Report shows the risk of the human element

Verizon 2024 Data Breach Report shows the risk of the human element

Verizon Business released its 17th-annual Data Breach Investigations Report (DBIR), highlighting the role that the human element plays in cyber threats. This report examined 30,458 security incidents as well as 10,626 verified breaches in 2023, representing a two-fold increase from 2022. Out of the breaches analyzed, more than two-thirds (68%) included a non-malicious human element — in other words, these incidents involved insider errors or people falling for social engineering schemes. This percentage remains consistent…

Read More

Prompt Hacking, Private GPTs and Zero-Day Exploits: The Impacts of AI on Cyber Security Landscape

Prompt Hacking, Private GPTs and Zero-Day Exploits: The Impacts of AI on Cyber Security Landscape

AI’s newfound accessibility will cause a surge in prompt hacking attempts and private GPT models used for nefarious purposes, a new report revealed. Experts at the cyber security company Radware forecast the impact that AI will have on the threat landscape in the 2024 Global Threat Analysis Report. It predicted that the number of zero-day exploits and deepfake scams will increase as malicious actors become more proficient with large language models and generative adversarial networks….

Read More

The cat and mouse ransomware game may threaten smaller organizations

The cat and mouse ransomware game may threaten smaller organizations

The practice of cybersecurity is ever-changing, marked by a continual dance between the attackers and the defenders. Each side is in a constant state of adaptation, reacting to the strategies of the other. The ongoing evolution of ransomware cybercrime is a prime illustration of this dynamic. Historically, ransomware attacks were somewhat isolated events. Today, they have morphed into coordinated global threats that target essential infrastructure, seeking substantial ransoms. The audacious attack on UnitedHealth by the…

Read More

Protect Your Business With This Seamless Firewall for $50

Protect Your Business With This Seamless Firewall for

TL;DR: There’s no shortage of threats to business out there these days, but DNS FireWall can help protect you from cyberthreats. Grab it for $49.97 this week only at TechRepublic Academy. There are myriad digital threats to businesses today, and it’s crucial that decision-makers prioritize cybersecurity. You don’t need a dedicated IT team to protect proprietary information. You can get a great security foundation with DNS FireWall, a security app developed to protect an unlimited…

Read More

Navigating the identity security landscape

Navigating the identity security landscape

In this episode of The Security Podcasts featuring Jeff Reich, Executive Director of the Identity Defined Security Alliance, we discuss the challenges security professionals are facing in the evolving landscape of identity security threats. “Something we see often is when we were asking the question, ‘how long do account stay active or in your system after someone leaves your organization?’ And certainly there are a number of organizations that say within two days it’s been…

Read More

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

CISOs know best practice information security management comes down to people as much as technology. Without employees and a robust security culture on your side, tech deployment will not stop threat actors, who continue to find their way into organisations. It appears Asia-Pacific employees are not getting the message. Cyber security company Proofpoint recently surveyed 7,500 employees and 1,050 security professionals in 15 countries, including Australia, Japan, South Korea and Singapore. The company found that…

Read More

UK's NCSC Issues Warning as SVR Hackers Target Cloud Services

UK's NCSC Issues Warning as SVR Hackers Target Cloud Services

Russian state hackers are adapting their techniques to target organizations moving to the cloud, an advisory from the UK National Cyber Security Centre and international security agencies has warned. The advisory details how cyber espionage group APT29 is directly targeting weaknesses in cloud services used by victim organizations to gain initial access to their systems. APT29 is also expanding the scope of its attacks beyond governments, think tanks, healthcare and energy providers to include victims…

Read More

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

Highlights from CrowdStrike’s 2024 report: Identity-based and social engineering attacks still take center stage. Cloud-environment intrusions have increased by 75% from 2022 to 2023. Third-party relationships exploitation makes it easier for attackers to hit hundreds of targets. CrowdStrike added 34 new threat actors in 2023. Attackers are compromising networks at a faster rate. Attackers are targeting periphery networks. CrowdStrike’s new 2024 Global Threat report exposed the latest trends in cyberattacks, and we’re highlighting the main…

Read More
1 2 3 4 5 6 15