Survey: Cybersecurity Skills Shortage is ‘Bad,’ But There’s Hope

Automation, strategic process design and an investment in training are the keys to managing the cybersecurity skills gap, according to a recent survey from Trustwave. Continue reading Survey: Cybersecurity Skills Shortage is ‘Bad,’ But There’s Hope

Bug-Bounty Awards Spike 26% in 2020

The most-rewarded flaw is XSS, which is among those that are relatively cheap for organizations to identify. Continue reading Bug-Bounty Awards Spike 26% in 2020

Microsoft: Most-Imitated Brand for Phishing Emails

The shift to remote working spurred Microsoft and Amazon to the top of the heap for cybercriminals to use as lures in the third quarter. Continue reading Microsoft: Most-Imitated Brand for Phishing Emails

Phishers Capitalize on Headlines with Breakneck Speed

Marking a pivot from COVID-19 scams, researchers track a single threat actor through the evolution from the pandemic to PayPal, and on to more timely voter scams — all with the same infrastructure. Continue reading Phishers Capitalize on Headlines with Breakneck Speed

BEC Attacks: Nigeria No Longer the Epicenter as Losses Top $26B

BEC fraudsters now have bases of operation across at least 39 counties and are responsible for $26 billion in losses annually — and growing. Continue reading BEC Attacks: Nigeria No Longer the Epicenter as Losses Top $26B

Industrial Cyberattacks Get Rarer but More Complex

The first half of 2020 saw decreases in attacks on most ICS sectors, but oil/gas firms and building automation saw upticks. Continue reading Industrial Cyberattacks Get Rarer but More Complex

Google Cloud Buckets Exposed in Rampant Misconfiguration

A too-large percentage of cloud databases containing highly sensitive information are publicly available, an analysis shows. Continue reading Google Cloud Buckets Exposed in Rampant Misconfiguration

Fileless Malware Tops Critical Endpoint Threats for 1H 2020

When it comes to endpoint security, a handful of threats make up the bulk of the most serious attack tools and tactics. Continue reading Fileless Malware Tops Critical Endpoint Threats for 1H 2020