Booking.com Phishers May Leave You With Reservations

A number of cybercriminal innovations are making it easier for scammers to cash in on your upcoming travel plans. This story examines a recent spear-phishing campaign that ensued when a California hotel had its booking.com credentials stolen. We’ll also explore an array of cybercrime services aimed at phishers who target hotels that rely on the world’s most visited travel website. Continue reading Booking.com Phishers May Leave You With Reservations

Pyongyang on the payroll? Signs that your company has hired a North Korean IT worker

SecureWorks has released research that dives into the tell-tale behaviors behind remote employees that may be working on behalf of North Korea.

The post Pyongyang on the payroll? Signs that your company has hired a North Korean IT worker appeared first on CyberScoop.

Continue reading Pyongyang on the payroll? Signs that your company has hired a North Korean IT worker

Secureworks Fills Australian Mid-Market Demand for Simplified Cyber Security Solutions

The CEO of a burgeoning cybersecurity firm spoke to TechRepublic about XDR, ransomware, the Crowdstrike outage and what organisations can do to prepare for cyberattacks. Continue reading Secureworks Fills Australian Mid-Market Demand for Simplified Cyber Security Solutions

Secureworks enables users to view known vulnerabilities in the context of threat data

Secureworks announced the ability to integrate vulnerability risk context with threat detection to prevent attackers from exploiting known vulnerabilities and expedite response times, improving an organization’s security posture. The integration betwee… Continue reading Secureworks enables users to view known vulnerabilities in the context of threat data

Ransomware trends and recovery strategies companies should know

Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, including phishing emails, malicious websites, and exploiting vulnerabilities in s… Continue reading Ransomware trends and recovery strategies companies should know

Cybercriminals can go from click to compromise in less than a day

The median dwell time in ransomware engagements dropped to just under 24 hours from 4.5 days in the previous year and 5.5 days in the year before that, according to SecureWorks. In 10% of cases, ransomware was even deployed within five hours of initial… Continue reading Cybercriminals can go from click to compromise in less than a day