Microsoft Office apps are vulnerable to IDN homograph attacks

Microsoft Office apps – including Outlook and Teams – are vulnerable to homograph attacks based on internationalized domain names (IDNs). In practice, this means that users hovering above a link in a phishing email, a Word or Excel document… Continue reading Microsoft Office apps are vulnerable to IDN homograph attacks

Future proofing: How companies can upgrade cyber defenses and be ready for tomorrow

Today’s threat landscape is constantly evolving. Threat actors and tactics are becoming more determined and advanced. In this video for Help Net Security, Jaspal Sawhney, Global CISO at Tata Communications, talks about future proofing, which starts wit… Continue reading Future proofing: How companies can upgrade cyber defenses and be ready for tomorrow

How confident are CISOs about their security posture?

Proofpoint released its annual Voice of the CISO report, which explores key challenges facing chief information security officers (CISOs). While the world’s CISOs spent 2021 coming to terms with new ways of working, many now feel much more in control o… Continue reading How confident are CISOs about their security posture?

Email is the riskiest channel for data security

A research from Tessian and the Ponemon Institute reveals that nearly 60% of organizations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months. Email was revealed as the riskiest channel for data loss in o… Continue reading Email is the riskiest channel for data security

Nothing personal: Training employees to identify a spear phishing attack

Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide criminal industry. In recent years, threat actors have refined their methods o… Continue reading Nothing personal: Training employees to identify a spear phishing attack

Passwords are secrets that should never be shared

A weak password is one of the easiest way for attackers to steal valuable information about a person from their accounts, and then commit crimes with it. The stronger the password, the more protected a computer will be from attackers and malicious soft… Continue reading Passwords are secrets that should never be shared

Leadership and recruitment changes needed to address burnout in cybersecurity

Most organizations—across almost every industry—have been forced to implement extensive digital components to their everyday operations so they can function efficiently. With this shift, cybersecurity awareness is permeating every business department a… Continue reading Leadership and recruitment changes needed to address burnout in cybersecurity

Prioritizing cybersecurity training during the onboarding process

In this interview with Help Net Security, Brent Johnson, CISO at Bluefin, talks about the importance of making cybersecurity training a priority for every organization and why is this often a difficult goal to achieve. There has been a lot of talk abou… Continue reading Prioritizing cybersecurity training during the onboarding process

63% of organizations paid the ransom last year

A record 71% of organizations were impacted by successful ransomware attacks last year, according to a CyberEdge Group report, up from 55% in 2017. Of those that were victimized, 63% paid the requested ransom, up from 39% in 2017. As to why more organi… Continue reading 63% of organizations paid the ransom last year

Making security mistakes may come with a high price for employees

Tessian reveals that one in four employees lost their job in the last 12 months, after making a mistake that compromised their company’s security. The new report, which explores why people make errors at work, also found that: 26% of respondents fell f… Continue reading Making security mistakes may come with a high price for employees