Cybercriminals customizing malware for attacks on virtual infrastructure

Cyber incidents continue to rise, ransomware accounts for nearly two-thirds of all malware attacks, and more cybercriminals are customizing malware for attacks on virtual infrastructure, Positive Technologies finds. According to the research, the numbe… Continue reading Cybercriminals customizing malware for attacks on virtual infrastructure

IT, healthcare and manufacturing top targets for cyberattacks

Avanan announced the release of a report which analyzes today’s threat landscape, phishing vectors, and industry-based attacks, exposing healthcare and manufacturing as two of the top targets for cyberattacks in the first half of the year. “With hospit… Continue reading IT, healthcare and manufacturing top targets for cyberattacks

Bitcoin cyber attacks surge following rising demand and increasing price of bitcoin

Phishing impersonations and business email compromise (BEC) attacks designed to steal victims’ bitcoin surged by 192% between October 2020 and May 2021, closely following the rising demand and increasing price of bitcoin over the last eight months, acc… Continue reading Bitcoin cyber attacks surge following rising demand and increasing price of bitcoin

Organizations increasingly reluctant to pay ransomware demands

Organizations hit by ransomware should not pay the ransom according to 79 percent of respondents to an online poll. To better understand concerns about recent ransomware attacks, Menlo Security conducted a global poll on responses and reactions to rans… Continue reading Organizations increasingly reluctant to pay ransomware demands

Consumers neglecting mobile security despite growing number of threats

Over the past year, consumers have adapted to many changes, including the rapid shift towards a digital-first lifestyle. This has led to an emphasis on consumers dependence on mobile devices, as they look to execute nearly all daily activities via devi… Continue reading Consumers neglecting mobile security despite growing number of threats

Can on-prem security experts make the move to the cloud?

As cloud computing grows in popularity across all use cases, cloud workloads have never been more attractive to malicious actors. A recent McAfee report points to a 630 percent increase in attacks aimed at cloud services since January 2020. There are s… Continue reading Can on-prem security experts make the move to the cloud?

SeKVM: Securing virtual machines in the cloud

Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses like Amazon, ensuring the safety and security of the data of its millions of customers is essenti… Continue reading SeKVM: Securing virtual machines in the cloud

Apple Patches Zero-Day XCSSET Exploit

By the time Apple patched a zero-day vulnerability in macOS 11.4 that bypasses the Transparency Consent and Control (TCC) framework, it was being exploited by attackers using XCSSET malware. Jamf researchers dissecting the malware and its exploitation… Continue reading Apple Patches Zero-Day XCSSET Exploit

Four proactive steps to make identity governance a business priority

Securing digital identities is crucial to business success today, but far too often, it’s an afterthought. As such, identity governance shouldn’t be celebrated as a singular component of security, but rather a capability that should be woven into the d… Continue reading Four proactive steps to make identity governance a business priority

Why passwordless is not always passwordless

The concept of passwordless authentication has been gathering steam. Gartner anticipates that by 2022, 60% of large and global enterprises will implement some sort of passwordless solution to enhance security. While these emerging authentication tools … Continue reading Why passwordless is not always passwordless