Ransomware attacks skyrocket as threat actors double down on U.S., global attacks

New studies by NCC Group and Barracuda Networks show threat actors are increasing ransomware exploits, with consumer goods and services receiving the brunt of attacks and a large percentage of victims being hit multiple times.
The post Ransomware attac… Continue reading Ransomware attacks skyrocket as threat actors double down on U.S., global attacks

New cybersecurity data reveals persistent social engineering vulnerabilities

Ransomware was down last year, though LockBit led threat actors and employees opened a third of the toxic emails in the last six months of 2022.
The post New cybersecurity data reveals persistent social engineering vulnerabilities appeared first on Te… Continue reading New cybersecurity data reveals persistent social engineering vulnerabilities

Following year-end ransomware storm, leaders batten hatches for sea of troubles in 2023

With the year ending with ransomware attacks, and 2023 beginning with a major data theft against T-Mobile, leaders are preparing for squalls ahead.
The post Following year-end ransomware storm, leaders batten hatches for sea of troubles in 2023 appeare… Continue reading Following year-end ransomware storm, leaders batten hatches for sea of troubles in 2023

Ransomware attacks jump as new malware strains proliferate, research finds

Ransomware cases increased 47 percent amid a rise in attacks involving new strains of malware from the LockBit cybercrime syndicate.

The post Ransomware attacks jump as new malware strains proliferate, research finds appeared first on CyberScoop.

Continue reading Ransomware attacks jump as new malware strains proliferate, research finds

BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones

A Bluetooth Low Energy (BLE) vulnerability discovered by NCC Group researchers may be used by attackers to unlock Teslas (or other cars with automotive keyless entry), residential smart locks, building access systems, mobile phones, laptops, and many o… Continue reading BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones

Increased risk tolerances are making digital transformation programs vulnerable

Digital transformation programs could be vulnerable to cyber attacks due to increased risk tolerances and ongoing cybersecurity challenges, according to a global research of 500 cybersecurity decision makers by NCC Group. Seventy-six per cent admitted … Continue reading Increased risk tolerances are making digital transformation programs vulnerable

Ransomware attacks increased by 288% in H1 2021

Analysis from NCC Group’s Research Intelligence and Fusion Team (RIFT) has highlighted the growing threat of ransomware around the world. The number of ransomware attacks analysed by the team has increased by 288% between January-March 2021 and April-J… Continue reading Ransomware attacks increased by 288% in H1 2021

Patch bypass flaw in Pulse Secure VPNs can lead to total compromise (CVE-2021-22937)

The patch for a vulnerability (CVE-2020-8260) in Pulse Connect Secure VPN devices that attackers have been exploiting in the wild can be bypassed, security researcher Rich Warren has found. This new patch bypass vulnerability that could lead to remote … Continue reading Patch bypass flaw in Pulse Secure VPNs can lead to total compromise (CVE-2021-22937)

AppOmni’s platform protects companies against cloud and SaaS breaches

From ransomware to data breaches, global cybersecurity incidents against organizations, governments, and individuals are on the rise. There have been a multitude of attacks over the past year, from SolarWinds and Kaseya to the Microsoft Exchange attack… Continue reading AppOmni’s platform protects companies against cloud and SaaS breaches

ioXt Alliance expands its Compliance Program to bring transparency to mobile apps and VPNs

The ioXt Alliance announced that it is expanding its ioXt Compliance Program with a new mobile application profile with added requirements for virtual private network (VPN) applications. Defined collaboratively by technology companies such as Google an… Continue reading ioXt Alliance expands its Compliance Program to bring transparency to mobile apps and VPNs