Devices Infected With Data-Stealing Malware Increased by 7 Times Since 2020

Devices Infected With Data-Stealing Malware Increased by 7 Times Since 2020

The number of devices infected with data-stealing malware in 2023 was 9.8 million, a sevenfold increase over the same figure for 2020, according to new research from Kaspersky Digital Footprint Intelligence. However, the researchers believe that the true figure could be as high as 16 million, as credentials from devices infected in 2023 may not be leaked onto the dark web until later this year (Figure A). Figure A: Number of infections of data-stealing malware…

Read More

The cat and mouse ransomware game may threaten smaller organizations

The cat and mouse ransomware game may threaten smaller organizations

The practice of cybersecurity is ever-changing, marked by a continual dance between the attackers and the defenders. Each side is in a constant state of adaptation, reacting to the strategies of the other. The ongoing evolution of ransomware cybercrime is a prime illustration of this dynamic. Historically, ransomware attacks were somewhat isolated events. Today, they have morphed into coordinated global threats that target essential infrastructure, seeking substantial ransoms. The audacious attack on UnitedHealth by the…

Read More

Stay a step ahead with the missing link in cybercrime defense: OSINT

Stay a step ahead with the missing link in cybercrime defense: OSINT

Chief Information Security Officers (CISOs) require a comprehensive set of tools, services and skilled people to succeed in the never-ending battle against cybercrime. They stand as the last line of defense to protect their organizations from losing data, money, reputation and, in extreme cases, the business itself. Adding OSINT-driven threat intelligence to the CISO toolkit can be a game-changer, delivering insights that enable a more proactive rather than reactive approach to cybercrime defenses. Whether launched…

Read More

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted

Organisations that have backed up their sensitive data may believe they are relatively safe from ransomware attacks; however, this is not the case based on findings from a new study from IT security company Sophos. The report showed that cybercriminals attempted to compromise the backups of 94% of companies hit by ransomware in the past year. Attackers are aware that those who fall victim to ransomware must choose to either pay the ransom or recover…

Read More

Asia-Pacific Ransomware Threats Depend on Country and Sector, Says Rapid7

Asia-Pacific Ransomware Threats Depend on Country and Sector, Says Rapid7

Raj Samani, Chief Scientist. Image: Rapid7 New research from cyber security firm Rapid7 has shown the ransomware attacks that IT and security professionals are up against in APAC are far from uniform, and they would be better off tapping intelligence that sheds light on attack trends in their specific jurisdiction or sector. Raj Samani, chief scientist at Rapid7, said actual ransomware threats often differ from assumptions based on news coverage. Attack surface research revealed significant…

Read More

How to fix the growing cybersecurity skills gap

How to fix the growing cybersecurity skills gap

Cyber and ransomware threats are growing at a rapid rate, critically endangering organizations’ sensitive data. In 2023, the global average cost of a data breach reached USD 4.45 million, a 15% increase over 3 years — predicted to reach $9.5 trillion USD in 2024. What’s more, organizations are now facing highly intelligent, AI-powered threats – including advanced phishing attacks, deep fakes, and fraudulent phone calls — that are increasingly challenging to identify and respond to….

Read More

Navigating the identity security landscape

Navigating the identity security landscape

In this episode of The Security Podcasts featuring Jeff Reich, Executive Director of the Identity Defined Security Alliance, we discuss the challenges security professionals are facing in the evolving landscape of identity security threats. “Something we see often is when we were asking the question, ‘how long do account stay active or in your system after someone leaves your organization?’ And certainly there are a number of organizations that say within two days it’s been…

Read More

Keep Your Data Safe and Become More Productive for Just $30

Keep Your Data Safe and Become More Productive for Just $30

It’s great that Windows comes free with your computer, and free upgrades are available as well. But they tend to be the basic versions, and if you’ve got business to take care of, you’ll probably appreciate the ways Microsoft Windows 10 Pro can increase productivity by allowing you to work smarter and so much more efficiently. Best of all, you can get Microsoft Windows 10 Pro for just $29.97 during a special week sale at…

Read More

Top 40 Cybersecurity Companies You Need to Know 2024

Top 40 Cybersecurity Companies You Need to Know 2024

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. As the demand for robust security defense grows, the market for cybersecurity technology has exploded, as have the number of available solutions. To help you navigate this growing market, we recommend 20 of the world’s leading cybersecurity technology providers and another 20 honorable mentions, based on their innovation, revenue and growth, user…

Read More

The return of a malware menace.

The return of a malware menace.

This week we are joined by, Selena Larson from Proofpoint, who is discussing their research, “Bumblebee Buzzes Back in Black.” Bumblebee is a sophisticated downloader used by multiple cybercriminal threat actors and was a favored payload from its first appearance in March 2022 through October 2023 before disappearing. After a four month hiatus, Proofpoint researchers found that the downloader returned. Its return aligns with a surge of cybercriminal threat activity after a notable absence of…

Read More
1 2 3 38