Ransomware in 2024: New players, bigger payouts, and smarter tactics

In 2024, ransomware remained the top cybersecurity threat to organizations worldwide. New groups filled the void left by law enforcement crackdowns, targeting businesses with record-breaking ransom demands and sophisticated tactics. In this article, yo… Continue reading Ransomware in 2024: New players, bigger payouts, and smarter tactics

New infosec products of the week: December 13, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, Horizon3.ai, SecureAuth, Stamus Networks, Trellix, and Versa Networks. Trellix Drive Encryption enhances security against insider attacks Trellix … Continue reading New infosec products of the week: December 13, 2024

Cybercriminals turn to pen testers to test ransomware efficiency

Ransomware gangs recruit pen testers to improve attack reliability Threat actors employ pen testers to improve ransomware effectiveness Threat actors are recruiting pen testers to test and improve the reliability of their ransomware for affiliate progr… Continue reading Cybercriminals turn to pen testers to test ransomware efficiency

Why are threat actors faking data breaches?

Earlier this year Europcar discovered a hacker selling info on its 50 million customers on the dark web. The European car rental company immediately launched an investigation, only to discover that the data being sold was completely doctored, possibly … Continue reading Why are threat actors faking data breaches?

Find out which cyber threats you should be concerned about

This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ heel of cybersecurity Proofpoint | 2024 Voice of the CISO | May 2024 … Continue reading Find out which cyber threats you should be concerned about

Log4J shows no sign of fading, spotted in 30% of CVE exploits

Organizations continue to run insecure protocols across their wide access networks (WAN), making it easier for cybercriminals to move across networks, according to a Cato Networks survey. Enterprises are too trusting within their networks The Cato CTRL… Continue reading Log4J shows no sign of fading, spotted in 30% of CVE exploits

Fake data breaches: Countering the damage

Amid the constant drumbeat of successful cyberattacks, some fake data breaches have also cropped up to make sensational headlines. Unfortunately, even fake data breaches can have real repercussions. Earlier this year, a hacker on a criminal forum claim… Continue reading Fake data breaches: Countering the damage