Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

How Do Cyber Attackers Hide Their Tracks After Committing Digital Fraud?

According to IBM, it takes an average of 197 days to detect a breach. Today's attackers go above and beyond to evade alerting capabilities and make it look like they were never there. While that number tends to be shorter for Insider Threats, Insiders also tend to be much better at deception and covering their tracks as well.

Everything you Need to Know about Phishing...

Considering we now spend more and more time online, it’s only natural that we’ve digitised almost every aspect of our daily lives. But in doing so, we may have opened ourselves up to a new and dangerous form of attack. Ever since we began using the internet, we have faced the risk of malicious activity. Fortunately, we’ve developed powerful tools to combat cyber-attacks and advanced email security services.

What is an Attack Vector? Common Attack Vectors

In cybersecurity, an attack vector is a path or means by which an attacker can gain unauthorized access to a computer or network to deliver a payload or malicious outcome. Attack vectors allow attackers to exploit system vulnerabilities, install different types of malware and launch cyber attacks. Attack vectors can also be exploited to gain access to sensitive data, personally identifiable information (PII) and other sensitive information that would result in a data breach.

5 Social Engineering Attacks to Watch Out For

We all know about the type of attacker who leverages their technical expertise to infiltrate protected computer systems and compromise sensitive data. This breed of malicious actor makes news all the time, prompting us to counter their exploits by investing in new technologies that will bolster our network defenses. However, there is another type of attacker who uses different tactics to skirt our tools and solutions.

DNS Rebinding: A Frightening Attack Vector with Spooky Security Impacts

One of the greatest misconceptions about online safety is that home networks are somehow private. Unfortunately, this hasn’t been true since around the turn of the century when we started filling our home networks with Internet-connected boxes serving local web pages. The problem is that web browsers typically make little distinction between web sites on the public internet versus those on a home or office network.

Ransomware, Phishing, and Supply Chain the Most Significant Threats to UK Businesses

Trend analysis is an important topic within threat intelligence. It lets us forecast where things are headed; whether they’re getting better, worse or different; and where we should be focusing our precious budgets. The UK’s National Cyber Security Centre (NCSC) recently released the Incident trends report (October 2018 – April 2019). This highlights some of the trends seen across various UK government entities, organizations and sectors.

HITRUST and Tripwire Partner to Help Healthcare Organizations Mature their Cybersecurity Practices

Cyberattacks in the healthcare industry show no signs of abating. In 2018, 15 million healthcare records were breached. Alarmingly, in the first half of 2019 alone, 32 million healthcare records were compromised as a result of multiple incidents including the American Medical Collection Agency (AMCA) breach. At AMCA, 24 million patient records were affected when an unauthorized user accessed systems that contained sensitive information like SSN, provider names and medical information.

Is the Electric Grid Ready to Respond to Increased Cyber Threats?

Reports from the U.S. Government Accountability Office (GAO) and Siemens highlight both the increasing cyber threats faced by the electric utility companies and the lack of adequate readiness to respond to these threats. According to these reports, a cyber-attack on the electric grid could cause “severe” damage.

Cyber Attack Risk Climbs in Latest WEF Regional Risk Report

Unsurprisingly, cyber attacks are growing in the business sector and not just in the United States but world-wide. Cyber-attacks represent the greatest risk in six out of ten of the top economies in the world. The report presented by the World Economic Forum discusses formjacking, cryptojacking, ransomware like LockerGoga and other cyber-attacks of which CEOs around the globe are starting to become more aware.

Survey: 93% of ICS Pros Fear Digital Attacks Will Affect Operations

Digital attackers are increasingly targeting industrial environments these days. Take manufacturing organizations, for instance. Back in late-August, FortiGuard Labs discovered a malspam campaign that had targeted a large U.S. manufacturing company with a variant of the LokiBot infostealer family. It wasn’t long thereafter when Bloomberg reported on the efforts of bad actors to target Airbus by infiltrating its suppliers’ networks.