Microsoft: Ransomware Attacks Growing More Dangerous, Complex

Microsoft: Ransomware Attacks Growing More Dangerous, Complex

The number of attempted ransomware attacks on Microsoft customers globally have grown dramatically in the last year, according to Microsoft’s Digital Defense report, released on Oct. 15. However, advancements in automatic attack disruption technologies have led to fewer of these attacks reaching the encryption stage. Microsoft reported 600 million cybercriminal and nation-state attacks occurring daily. While ransomware attempts increased by 2.75 times, successful attacks involving data encryption and ransom demands dropped by three-fold. The inverse…

Read More

U.K. and U.S. Warn of Pro-Russia Hacktivist Attacks on Operational Technology Systems

U.K. and U.S. Warn of Pro-Russia Hacktivist Attacks on Operational Technology Systems

The U.K.’s National Cyber Security Centre (NCSC) and other international cyber authorities, including the Federal Bureau of Investigation (FBI), have warned about pro-Russia hacktivist attacks targeting providers of operational technology. OT is hardware and software that interacts with the physical environment and includes smart water metres, automated irrigation systems, dam monitoring systems, smart grids and IoT sensors for precision agriculture. In the alert published on May 1, the cyber authorities provide advice to OT providers…

Read More

The Warning Shot: Two Years Later, Ukraine Is Just the Beginning

The Warning Shot: Two Years Later, Ukraine Is Just the Beginning

The world has changed. Two years ago, when Russia invaded Ukraine, that change became front-page news. The war on Europe’s Eastern flank is simply one symptom of a larger geopolitical reality. Other symptoms — additional wars and conflicts — have already erupted and will continue to emerge as a result of the changing world order. A look back at the last two years of war in Ukraine serves as a stark reminder of the urgent…

Read More

Connecting the wars: Intel analysis of Israel-Hamas and Russia-Ukraine

Connecting the wars: Intel analysis of Israel-Hamas and Russia-Ukraine

Connecting the wars: Intel analysis of Israel-Hamas and Russia-Ukraine | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Russia Calling? Scammers Target High-level Western Officials

Russia Calling? Scammers Target High-level Western Officials

An image of Alexei Stolyarov or Lexus (L) impersonating Leonid Volkov next to a picture of the real Volkov (R) for comparison Handout Text size A pro-Russian prankster impersonates a former US ambassador to Moscow in live video calls, part of a disinformation campaign that researchers say seeks to ensnare high-level Western officials since the invasion of Ukraine. Russian comedy duo Vladimir Kuznetsov and Alexei Stolyarov, who go by Vovan and Lexus, have long been…

Read More

Global security threats in 2022: Looking back to move forward

Global security threats in 2022: Looking back to move forward

Global security threats in 2022: Looking back to move forward | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Working in a conflict zone: Lessons from the crisis in Ukraine

Working in a conflict zone: Lessons from the crisis in Ukraine

Working in a conflict zone: Lessons from the crisis in Ukraine | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Security leaders assess geopolitical events affecting security in 2022

Security leaders assess geopolitical events affecting security in 2022

Security leaders assess geopolitical events affecting security in 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Top 5 emerging enterprise risks in Q2 2022

Top 5 emerging enterprise risks in Q2 2022

Top 5 emerging enterprise risks in Q2 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2